CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3DescriptionNVD
A vulnerability was found in H3C GR-3000AX V100R007L50. It has been classified as critical. Affected is the function UpdateWanParamsMulti/UpdateIpv6Params of the file /routing/goform/aspForm. The manipulation of the argument param leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor confirms the existence of this issue. Because they assess the risk as low, they do not have immediate plans for remediation.
AnalysisAI
A critical buffer overflow vulnerability exists in H3C GR-3000AX V100R007L50 within the UpdateWanParamsMulti/UpdateIpv6Params functions of /routing/goform/aspForm that allows authenticated remote attackers to achieve complete system compromise (confidentiality, integrity, and availability). Public exploit code is available and the vulnerability is actively exploitable; however, the vendor has assessed the risk as low and has not committed to immediate patching, despite confirmed existence of the issue.
Technical ContextAI
This vulnerability is a classic buffer overflow (CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer) in a network routing appliance's web-based management interface. The H3C GR-3000AX is a router/gateway device; the vulnerable code path processes WAN configuration parameters through HTTP POST requests to the aspForm handler. The 'param' argument passed to UpdateWanParamsMulti or UpdateIpv6Params functions does not properly validate input length before copying to a fixed-size buffer, enabling stack or heap corruption. The affected CPE would be: cpe:2.3:h:h3c:gr-3000ax:100r007l50:*:*:*:*:*:*:*. The aspForm interface is a server-side form processing component typical in embedded Linux-based network devices, suggesting the backend is likely written in C/C++ without modern memory safety protections.
RemediationAI
Immediate patches are not available from the vendor due to their assessment of low risk and lack of remediation commitment. Recommended mitigations: (1) Restrict network access to the /routing/goform/aspForm endpoint using firewall rules, allowing management traffic only from trusted administrative networks; (2) Implement network segmentation to isolate router management interfaces from untrusted network segments; (3) Monitor authentication logs for suspicious administrative activity or failed login attempts; (4) If feasible, transition to alternative routing platforms with active security support and patch availability; (5) Contact H3C support to inquire about undisclosed patches or firmware updates that may address CWE-119 issues in newer versions; (6) Implement intrusion detection/prevention signatures targeting malformed 'param' arguments to UpdateWanParamsMulti/UpdateIpv6Params if available from security vendors. Without vendor patches, compensating controls focusing on access restriction are essential.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18345