A vulnerability has been found in UTT 进取 512W up to 1.7.7-171114. Affected by this issue is the function strcpy of the file /goform/formP2PLimitConfig. Such manipulation of the argument except leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/DavCloudz/cve/blob/main/UTT/512W/UTT%20512W%20Buffer%20Overflow%20Vulnerability.md | Exploit Third Party Advisory |
| https://github.com/DavCloudz/cve/blob/main/UTT/512W/UTT%20512W%20Buffer%20Overflow%20Vulnerability.md#poc | Exploit |
| https://vuldb.com/?ctiid.334611 | Permissions Required VDB Entry |
| https://vuldb.com/?id.334611 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.699220 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
05 Jan 2026, 19:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/DavCloudz/cve/blob/main/UTT/512W/UTT%20512W%20Buffer%20Overflow%20Vulnerability.md - Exploit, Third Party Advisory | |
| References | () https://github.com/DavCloudz/cve/blob/main/UTT/512W/UTT%20512W%20Buffer%20Overflow%20Vulnerability.md#poc - Exploit | |
| References | () https://vuldb.com/?ctiid.334611 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.334611 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.699220 - Third Party Advisory, VDB Entry | |
| First Time |
Utt 512w Firmware
Utt Utt 512w |
|
| CPE | cpe:2.3:o:utt:512w_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:utt:512w:3.0:*:*:*:*:*:*:* |
07 Dec 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-07 13:15
Updated : 2026-01-05 19:36
NVD link : CVE-2025-14191
Mitre link : CVE-2025-14191
CVE.ORG link : CVE-2025-14191
JSON object : View
Products Affected
utt
- 512w_firmware
- 512w
