A vulnerability was identified in UTT 进取 512W up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/ConfigExceptMSN. Such manipulation of the argument remark leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
References
| Link | Resource |
|---|---|
| https://github.com/cymiao1978/cve/blob/main/new/17.md | Exploit Third Party Advisory |
| https://github.com/cymiao1978/cve/blob/main/new/17.md#poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.338421 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338421 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.708351 | Third Party Advisory VDB Entry |
| https://github.com/cymiao1978/cve/blob/main/new/17.md#poc | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
31 Dec 2025, 18:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/cymiao1978/cve/blob/main/new/17.md - Exploit, Third Party Advisory | |
| References | () https://github.com/cymiao1978/cve/blob/main/new/17.md#poc - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.338421 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.338421 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.708351 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:o:utt:512w_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:utt:512w:3.0:*:*:*:*:*:*:* |
|
| First Time |
Utt 512w Firmware
Utt Utt 512w |
26 Dec 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/cymiao1978/cve/blob/main/new/17.md#poc - |
26 Dec 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-26 01:15
Updated : 2025-12-31 18:57
NVD link : CVE-2025-15092
Mitre link : CVE-2025-15092
CVE.ORG link : CVE-2025-15092
JSON object : View
Products Affected
utt
- 512w_firmware
- 512w
