CVE-2025-11305
Published: 05 October 2025
Summary
CVE-2025-11305 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Utt 840G Firmware. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 36.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents buffer overflow by validating and restricting the size and content of the txtMin2 input argument in /goform/formTaskEdit.
Implements memory protections like stack canaries, ASLR, and non-executable memory to block exploitation of the strcpy buffer overflow even if input validation fails.
Requires timely identification, reporting, and remediation of the buffer overflow flaw, including applying patches or workarounds despite vendor unresponsiveness.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow in router web interface (/goform/formTaskEdit) enables remote low-privilege attackers to execute arbitrary code over the network, directly facilitating exploitation of public-facing applications, remote services, and privilege escalation.
NVD Description
A vulnerability has been found in UTT HiPER 840G up to 3.1.1-190328. Affected by this issue is the function strcpy of the file /goform/formTaskEdit. The manipulation of the argument txtMin2 leads to buffer overflow. Remote exploitation of the attack is…
more
possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2025-11305 is a buffer overflow vulnerability in UTT HiPER 840G routers up to version 3.1.1-190328. The flaw affects the strcpy function in the /goform/formTaskEdit file, where manipulation of the txtMin2 argument triggers the overflow. It is classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-120 (Buffer Copy without Checking Size of Input).
The vulnerability enables remote exploitation by an attacker with low privileges (PR:L). Per the CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), exploitation over the network requires low complexity, no user interaction, and results in high impacts to confidentiality, integrity, and availability, potentially allowing arbitrary code execution.
VulDB advisories and a related GitHub issue document the public disclosure of an exploit. The vendor was notified early but provided no response, and no patches or official mitigations are available.
The exploit has been disclosed publicly and may be actively used in the wild.
Details
- CWE(s)