CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability was found in UTT 进取 750W up to 5.0. It has been classified as critical. This affects the function strcpy of the file /goform/setSysAdm of the component API. The manipulation of the argument passwd1 leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Analysis
Critical remote buffer overflow vulnerability in UTT 进取 750W network devices affecting the /goform/setSysAdm API endpoint. An unauthenticated remote attacker can exploit improper use of strcpy() in the passwd1 parameter to achieve complete system compromise (confidentiality, integrity, and availability). A public proof-of-concept exploit exists, and the vendor has not provided patches or response despite early disclosure notification.
Technical Context
This vulnerability stems from CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), specifically unsafe use of strcpy() without bounds checking in the /goform/setSysAdm API endpoint. The affected component is a web-based administrative interface on UTT 进取 750W devices (versions up to 5.0). The strcpy() function copies user-supplied input from the 'passwd1' parameter directly into a fixed-size buffer on the stack, enabling stack-based buffer overflow. No input validation or length restrictions are applied before the copy operation. CPE identification suggests embedded networking equipment (likely industrial/commercial-grade router or gateway). The vulnerability is remotely exploitable over HTTP/HTTPS without authentication, making the attack surface extremely broad.
Affected Products
进取 750W (up to 5.0)
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18354