{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-11651","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-12T06:22:08.174Z","datePublished":"2025-10-12T23:32:06.071Z","dateUpdated":"2025-10-14T20:08:25.323Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-10-12T23:32:06.071Z"},"title":"UTT 进取 518G formRemoteControl sub_4247AC buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"UTT","product":"进取 518G","versions":[{"version":"V3v3.2.7-210919-161313","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in UTT 进取 518G up to V3v3.2.7-210919-161313. This vulnerability affects the function sub_4247AC of the file /goform/formRemoteControl. The manipulation of the argument Profile leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine Schwachstelle wurde in UTT 进取 518G up to V3v3.2.7-210919-161313 gefunden. Es betrifft die Funktion sub_4247AC der Datei /goform/formRemoteControl. Mittels Manipulieren des Arguments Profile mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgeführt werden. Der Exploit ist öffentlich verfügbar und könnte genutzt werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-12T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-12T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-12T08:27:16.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"cymiao (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.328068","name":"VDB-328068 | UTT 进取 518G formRemoteControl sub_4247AC buffer overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.328068","name":"VDB-328068 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.664925","name":"Submit #664925 | UTT 进取 518G <=V3v3.2.7-210919-161313 Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://github.com/cymiao1978/cve/blob/main/13.md","tags":["related"]},{"url":"https://github.com/cymiao1978/cve/blob/main/13.md#poc","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-14T20:08:18.281072Z","id":"CVE-2025-11651","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-14T20:08:25.323Z"}}]}}