CVE-2025-15430

HIGH7.4/ 10.0
Share:
Published: January 2, 2026 at 06:15 AM
Modified: January 12, 2026 at 08:26 PM
Source: cna@vuldb.com

Vulnerability Description

A vulnerability was detected in UTT 进取 512W 1.7.7-171114. Affected by this issue is the function strcpy of the file /goform/formFtpServerShareDirSelcet. Performing manipulation of the argument oldfilename results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Metrics

Base Score
7.4
Severity
HIGH
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: cna@vuldb.com

AI Security Analysis

01 // Technical Summary

Critical vulnerability discovered in UTT 进取 512W 1.7.7-171114 allows for remote code execution due to a buffer overflow in the strcpy function. This vulnerability is easily exploitable and poses a significant risk of complete system compromise, as the vendor has not responded to the disclosure.

02 // Vulnerability Mechanism

Step 1: Payload Delivery: The attacker crafts a malicious HTTP request to the vulnerable device, targeting the /goform/formFtpServerShareDirSelcet endpoint.

Step 2: Malicious Input: The attacker includes a specially crafted oldfilename argument in the HTTP request. This argument contains a string that is longer than the buffer allocated for it.

Step 3: strcpy Execution: The vulnerable strcpy function attempts to copy the attacker-controlled oldfilename into the buffer.

Step 4: Buffer Overflow: Due to the lack of bounds checking, strcpy writes past the end of the allocated buffer, overwriting adjacent memory regions.

Step 5: Code Execution: By carefully crafting the oldfilename payload, the attacker can overwrite critical program data, such as function pointers or return addresses, redirecting program execution to attacker-controlled code (e.g., a shellcode payload) or achieving a denial-of-service.

03 // Deep Technical Analysis

The vulnerability lies within the /goform/formFtpServerShareDirSelcet file, specifically in the use of the strcpy function. The function is used to copy the contents of the oldfilename argument without any bounds checking. This lack of validation allows an attacker to provide an oldfilename argument that exceeds the allocated buffer size, leading to a buffer overflow. This overwrite can overwrite adjacent memory, including critical program data or control flow structures, enabling the attacker to execute arbitrary code. The root cause is a classic buffer overflow due to the unsafe use of strcpy and the absence of input validation on the oldfilename parameter. This allows for arbitrary code execution.

CVE-2025-15430 - HIGH Severity (7.4) | Free CVE Database | 4nuxd