CVE-2025-11652

was · was Multiple Products (Specifically UTT Enterprise 518G)

A high-severity vulnerability has been identified in UTT networking equipment, specifically impacting UTT Enterprise 518G models.

Executive summary

A high-severity vulnerability has been identified in UTT networking equipment, specifically impacting UTT Enterprise 518G models. This flaw could allow an unauthenticated remote attacker to gain complete control over the affected device. Successful exploitation could lead to network disruption, data interception, and unauthorized access to the internal corporate network.

Vulnerability

The vulnerability is a command injection flaw within the device's web-based management interface. An unauthenticated attacker can send a specially crafted HTTP request to a specific, exposed endpoint on the device. This request contains malicious OS commands which are not properly sanitized by the application, allowing them to be executed directly on the underlying operating system with root-level privileges, resulting in a full compromise of the device.

Business impact

This vulnerability presents a significant risk to the organization, reflected by its High severity rating with a CVSS score of 8.8. An attacker exploiting this flaw could gain a persistent foothold on the network perimeter, leading to severe consequences. These include the ability to intercept or redirect network traffic, steal sensitive data, disrupt network availability causing business outages, and use the compromised device as a pivot point to launch further attacks against internal systems. The integrity, confidentiality, and availability of the organization's data and network services are at critical risk.

Remediation

Immediate Action: Identify all vulnerable UTT devices within the environment and apply the security updates released by the vendor immediately. After patching, it is crucial to monitor for any signs of post-remediation exploitation attempts and thoroughly review historical access logs for indicators of compromise that may have occurred prior to patching.

Proactive Monitoring: Implement enhanced monitoring on the management interfaces of affected devices. Security teams should look for suspicious inbound web requests, especially those containing shell metacharacters (e.g., ;, |, &&, $()). Monitor for anomalous outbound traffic originating from the devices, unexpected process execution, or unexplained spikes in CPU or memory utilization, which could indicate a successful compromise.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Disable WAN/remote access to the device's web management interface and restrict access to a dedicated, trusted internal management network segment. Use an upstream firewall to create explicit deny rules for any traffic attempting to reach the management port from untrusted sources.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the critical position these devices occupy on the network perimeter, this vulnerability must be addressed with extreme urgency. Although it is not currently listed on the CISA KEV list, its severity warrants immediate action. We strongly recommend that the organization prioritize the deployment of vendor-supplied patches to all affected UTT devices without delay. If patching cannot be performed immediately, the compensating controls outlined above, particularly restricting management interface access from the internet, must be implemented as a critical interim measure to mitigate risk.