CVE Alert: CVE-2025-10171 – UTT – 1250GW

CVE-2025-10171

HIGHNo exploitation known

A vulnerability was detected in UTT 1250GW up to 3.2.2-200710. This vulnerability affects the function sub_453DC of the file /goform/formConfigApConfTemp. Performing manipulation results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS v3.1 (8.8)
Vendor
UTT
Product
1250GW
Versions
3.2.2-200710
CWE
CWE-120, Buffer Overflow
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Published
2025-09-09T21:32:05.636Z
Updated
2025-09-09T21:32:05.636Z

AI Summary Analysis

Risk verdict

High risk due to a publicly available exploit for a remote buffer overflow on a network-facing component; urgent patching and exposure control recommended.

Why this matters

Memory corruption and remote code execution on an industrial/embedded gateway can lead to full device compromise and potential networkwide impact. Adversaries may aim to gain persistent access, reconfigure devices, or pivot to adjacent systems, especially where management interfaces are exposed.

Most likely attack path

  • Network access (no user interaction) required to reach the vulnerable endpoint.
  • Low-privilege attacker could trigger the overflow, with potential impact limited by unchanged scope but high impact on the device itself.
  • Exploit publicly available increases likelihood of automated or scripted attempts, elevating risk of rapid mass exploitation against exposed devices.

Who is most exposed

Devices with internet- or WAN-facing management portals, in distributed deployments or poorly segmented OT/IT networks, are most at risk; typical in vendor gateways or industrial deployments lacking strict access controls.

Detection ideas

  • Unusual, oversized requests to the management endpoint /goform/formConfigApConfTemp.
  • Device instability: reboots, crashes, or core dumps following config requests.
  • Abnormal login activity: repeated failed/admin account usage from untrusted sources.
  • Configuration changes or anomaly logs around the time of exploitation attempts.
  • Known exploit indicators or payload signatures in network traces or appliance logs.

Mitigation and prioritisation

  • Apply the vendor patch (or latest firmware) addressing the buffer overflow immediately.
  • If patching is delayed, restrict management interface access to trusted networks, disable remote configuration where possible, and enable MFA for admin access.
  • Add network segmentation and allow-listing of management traffic; monitor for anomalous config changes.
  • Prepare change-management plan and test patch in a staging environment prior to production rollout.
  • Treat as priority high given CVSS severity and public PoC; escalate if KEV/EPSS indicators emerge.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.