CVE-2025-14191

has · has Multiple Products

A high-severity vulnerability has been discovered in multiple products from the vendor "has," specifically impacting the UTT 进取 512W network device.

Executive summary

A high-severity vulnerability has been discovered in multiple products from the vendor "has," specifically impacting the UTT 进取 512W network device. This flaw could allow a remote, unauthenticated attacker to gain complete control over affected devices, potentially leading to network disruption, data interception, and unauthorized access to the internal network. Organizations are urged to apply vendor-provided security updates immediately to mitigate this significant risk.

Vulnerability

The vulnerability is a command injection flaw within the web-based management interface of the affected devices. An unauthenticated attacker can exploit this by sending a specially crafted HTTP request to the device. The input is not properly sanitized before being used in a system command, allowing the attacker to inject and execute arbitrary commands on the underlying operating system with administrative privileges.

Business impact

This is a High severity vulnerability with a CVSS score of 8.8, posing a significant and direct threat to business operations. Successful exploitation could grant an attacker complete control over a critical network infrastructure device. This could lead to severe consequences, including interception of sensitive network traffic (data exfiltration), denial-of-service by disrupting network connectivity, and using the compromised device as a pivot point to launch further attacks against the internal corporate network. The risk to data confidentiality, integrity, and availability is substantial.

Remediation

Immediate Action: Identify all affected devices within the network and apply the security updates provided by the vendor immediately. Prioritize patching for any devices that are internet-facing or manage critical network segments. After patching, monitor for any signs of compromise that may have occurred prior to the update and review device access logs for any suspicious activity.

Proactive Monitoring: Implement enhanced monitoring of network traffic to and from the management interfaces of affected devices. Look for unusual or malformed HTTP requests, unexpected outbound connections originating from the devices, and any unauthorized configuration changes or system reboots. Security teams should configure alerts for anomalous login attempts or access from untrusted IP addresses.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Restrict access to the device's web management interface to a secure, isolated management network. Use firewall rules to block all access to the management interface from the public internet and from non-essential internal network segments.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity of this vulnerability, we strongly recommend that organizations take immediate action. The primary course of action is to apply the vendor-supplied patches to all affected devices without delay, prioritizing those exposed to the internet. While this CVE is not currently on the CISA KEV list, its critical nature makes it a prime candidate for future inclusion and an attractive target for attackers. Organizations must assume that exploitation is imminent and implement both patching and the recommended compensating controls to protect their network infrastructure.