A vulnerability was identified in UTT 进取 512W up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/ConfigExceptMSN. Such manipulation of the argument remark leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
UTT 进取 512W ConfigExceptMSN strcpy buffer overflow
Problem type
Affected products
UTT
1.7.7-171114 - AFFECTED
References
https://vuldb.com/?id.338421
https://vuldb.com/?ctiid.338421
https://vuldb.com/?submit.708351
https://github.com/cymiao1978/cve/blob/main/new/17.md
https://github.com/cymiao1978/cve/blob/main/new/17.md#poc
GitHub Security Advisories
GHSA-q45h-4pv4-p744
A vulnerability was identified in UTT 进取 512W up to 1.7.7-171114. Impacted is the function strcpy...
https://github.com/advisories/GHSA-q45h-4pv4-p744A vulnerability was identified in UTT 进取 512W up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/ConfigExceptMSN. Such manipulation of the argument remark leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
https://nvd.nist.gov/vuln/detail/CVE-2025-15092
https://github.com/cymiao1978/cve/blob/main/new/17.md
https://github.com/cymiao1978/cve/blob/main/new/17.md#poc
https://vuldb.com/?ctiid.338421
https://vuldb.com/?id.338421
https://vuldb.com/?submit.708351
https://github.com/advisories/GHSA-q45h-4pv4-p744
JSON source
https://cveawg.mitre.org/api/cve/CVE-2025-15092Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-15092",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2025-12-26T15:06:18.525Z",
"dateReserved": "2025-12-25T12:42:34.037Z",
"datePublished": "2025-12-26T00:02:06.954Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2025-12-26T00:02:06.954Z"
},
"title": "UTT 进取 512W ConfigExceptMSN strcpy buffer overflow",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was identified in UTT 进取 512W up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/ConfigExceptMSN. Such manipulation of the argument remark leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used."
}
],
"affected": [
{
"vendor": "UTT",
"product": "进取 512W",
"versions": [
{
"version": "1.7.7-171114",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Buffer Overflow",
"cweId": "CWE-120",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Memory Corruption",
"cweId": "CWE-119",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?id.338421",
"name": "VDB-338421 | UTT 进取 512W ConfigExceptMSN strcpy buffer overflow",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/?ctiid.338421",
"name": "VDB-338421 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.708351",
"name": "Submit #708351 | UTT 进取 512W v3v1.7.7-171114 Buffer Overflow",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/cymiao1978/cve/blob/main/new/17.md",
"tags": [
"related"
]
},
{
"url": "https://github.com/cymiao1978/cve/blob/main/new/17.md#poc",
"tags": [
"exploit"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"baseScore": 8.8,
"baseSeverity": "HIGH"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"baseScore": 8.8,
"baseSeverity": "HIGH"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"baseScore": 9
}
}
],
"timeline": [
{
"time": "2025-12-25T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2025-12-25T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2025-12-25T13:47:43.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "cymiao (VulDB User)",
"type": "reporter"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-12-26T15:06:18.525Z"
},
"title": "CISA ADP Vulnrichment",
"references": [
{
"url": "https://github.com/cymiao1978/cve/blob/main/new/17.md#poc",
"tags": [
"exploit"
]
}
],
"metrics": [
{}
]
}
]
}
}