Cyber Posture

CVE-2025-7570

HighPublic PoC

Published: 14 July 2025

Published
14 July 2025
Modified
08 January 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0149 81.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-7570 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Utt 840G Firmware. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 18.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents buffer overflows by requiring validation and sanitization of inputs like the remoteSrcTemp argument in the vulnerable /goform/aspRemoteApConfTempSend endpoint.

prevent

Implements memory protection mechanisms such as stack canaries, ASLR, and DEP to mitigate exploitation of buffer overflows even if invalid input reaches the vulnerable functionality.

prevent

Requires timely remediation of identified flaws like CVE-2025-7570 through patching, configuration changes, or feature disablement to eliminate the buffer overflow vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Buffer overflow in public web form (/goform/aspRemoteApConfTempSend) of network device directly enables remote exploitation for code execution (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been rated as critical. Affected by this issue is some unknown functionality of the file /goform/aspRemoteApConfTempSend. The manipulation of the argument remoteSrcTemp leads to buffer overflow. The…

more

attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2025-7570 is a critical buffer overflow vulnerability (CVSS 3.1 score of 8.8, vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) in UTT HiPER 840G routers up to version 3.1.1-190328. The flaw affects an unknown functionality within the /goform/aspRemoteApConfTempSend file, where manipulation of the remoteSrcTemp argument triggers the overflow, classified under CWE-119 and CWE-120.

An attacker with low privileges can exploit this remotely with low attack complexity and no user interaction required. Successful exploitation enables high-impact compromise of confidentiality, integrity, and availability, potentially leading to arbitrary code execution or system takeover.

References from VulDB and a GitHub repository indicate that a proof-of-concept exploit has been publicly disclosed and may be used. The vendor was contacted early regarding the issue but provided no response, and no patches or specific mitigations are mentioned in the available advisories.

Details

CWE(s)

Affected Products

utt
840g firmware
≤ 3.1.1-190328

CVEs Like This One

CVE-2025-7571Same product: Utt 840G
CVE-2025-10756Same product: Utt 840G
CVE-2025-11305Same product: Utt 840G
CVE-2026-2067Same vendor: Utt
CVE-2025-10953Same vendor: Utt
CVE-2025-11652Same vendor: Utt
CVE-2025-14534Same vendor: Utt
CVE-2026-2066Same vendor: Utt
CVE-2025-10757Same vendor: Utt
CVE-2025-15460Same vendor: Utt

References