CVE-2025-10756
UTT · UTT Multiple Products
A critical vulnerability has been identified in multiple UTT network devices, assigned CVE-2025-10756, with a high severity CVSS score of 8.8.
Executive summary
A critical vulnerability has been identified in multiple UTT network devices, assigned CVE-2025-10756, with a high severity CVSS score of 8.8. This flaw could allow a remote, unauthenticated attacker to gain complete control over an affected device. Successful exploitation could lead to network traffic interception, service disruption, and unauthorized access to the internal network.
Vulnerability
The vulnerability is a command injection flaw within the web-based management interface of the affected UTT devices. An unauthenticated attacker can send a specially crafted HTTP request containing arbitrary operating system commands to a specific, publicly exposed script on the device. The input is not properly sanitized, allowing the embedded commands to be executed on the underlying system with root-level privileges, giving the attacker full control of the device.
Business impact
This vulnerability presents a High severity risk to the organization, reflected by its CVSS score of 8.8. An attacker exploiting this flaw can gain complete administrative control over the network gateway, which is a critical security boundary. Potential consequences include the ability to monitor, redirect, or block all network traffic, leading to data breaches and significant operational downtime. Furthermore, a compromised gateway can be used as a pivot point to launch further attacks against the internal corporate network, steal sensitive data, or deploy ransomware.
Remediation
Immediate Action: Apply the security updates provided by UTT to all affected devices immediately. Patches should be downloaded from the official vendor support website and applied through the device's management interface. After patching, review device access logs and web server logs for any signs of compromise or exploitation attempts that may have occurred prior to the update.
Proactive Monitoring: Security teams should actively monitor for indicators of compromise. This includes reviewing web access logs for unusual requests containing shell metacharacters (e.g., ;, |, &&, $()). Monitor network traffic for unexpected outbound connections originating from the management interface of the UTT devices. Unexplained spikes in CPU or memory utilization on the devices could also indicate malicious activity.
Compensating Controls: If immediate patching is not feasible, implement network-level access controls to restrict access to the device's web management interface. Limit access to a dedicated, trusted management network or specific, authorized IP addresses. If a Web Application Firewall (WAF) is deployed, create a virtual patch or custom rule to block requests containing patterns associated with command injection attacks targeting the affected interface.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity (CVSS 8.8) and the critical nature of the affected devices (network gateways), this vulnerability requires immediate attention. A successful exploit would grant an attacker a significant foothold in the network. Although this CVE is not currently listed on the CISA KEV list, its characteristics make it a prime candidate for future inclusion. We strongly recommend that organizations prioritize the deployment of the vendor-supplied patches to all affected UTT devices without delay to prevent potential compromise.