CVE-2025-11323

was · was UTT 1250GW

A high-severity vulnerability, identified as CVE-2025-11323, has been discovered in was UTT 1250GW gateway devices.

Executive summary

A high-severity vulnerability, identified as CVE-2025-11323, has been discovered in was UTT 1250GW gateway devices. This flaw could potentially allow a remote attacker to compromise affected systems, leading to a complete loss of confidentiality, integrity, and availability. Organizations using the specified product versions should prioritize immediate patching to prevent potential system takeovers and further network intrusion.

Vulnerability

The vulnerability is a critical command injection flaw within the web management interface of the UTT 1250GW device. An unauthenticated remote attacker can exploit this by sending a specially crafted HTTP request to a specific endpoint on the device. Due to insufficient input validation, the malicious payload is executed directly by the underlying operating system with root privileges, granting the attacker full control over the device.

Business impact

This vulnerability presents a significant risk to the organization, reflected by its High severity rating with a CVSS score of 8.8. Successful exploitation could lead to a complete compromise of the network gateway, allowing an attacker to intercept or redirect network traffic, launch further attacks against the internal network (pivoting), exfiltrate sensitive data, or cause a denial-of-service condition by disabling the device. The potential consequences include major data breaches, significant operational downtime, and reputational damage.

Remediation

Immediate Action: System administrators must immediately identify all vulnerable UTT 1250GW devices and apply the security updates provided by the vendor. After patching, review system and network access logs for any anomalous activity or indicators of compromise that may have occurred prior to remediation.

Proactive Monitoring: Implement enhanced monitoring for affected devices. Specifically, look for unusual or malformed requests to the web management interface in web server logs, unexpected outbound connections originating from the gateway device, and unexplained spikes in CPU or memory utilization.

Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:

  • Restrict access to the device's web management interface to a secure, isolated management network or specific trusted IP addresses.
  • If exposed to the internet, place the device behind a Web Application Firewall (WAF) with rules designed to block command injection attack patterns.
  • Ensure strict firewall egress rules are in place to prevent the device from making unauthorized outbound connections.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8, this vulnerability requires immediate attention. The primary recommendation is to apply the vendor-supplied patches to all affected systems without delay. Although this CVE is not currently listed on the CISA KEV list, its severity makes it a prime candidate for future inclusion and an attractive target for attackers. Organizations that cannot patch immediately must implement the suggested compensating controls to reduce their attack surface while preparing for deployment.