CVE-2025-15089

has · has Multiple Products, including UTT 进取 512W

A high-severity vulnerability has been discovered in multiple products from the vendor 'has', including the UTT 进取 512W network device.

Executive summary

A high-severity vulnerability has been discovered in multiple products from the vendor 'has', including the UTT 进取 512W network device. This flaw allows an unauthenticated remote attacker to gain complete control of affected systems. Successful exploitation could lead to network traffic interception, unauthorized access to internal networks, and full system compromise.

Vulnerability

The vulnerability is an unauthenticated command injection flaw in the web-based management interface of the affected devices. A specific component, designed for network diagnostics, fails to properly sanitize user-supplied input. An attacker can send a specially crafted HTTP request to this component, embedding arbitrary operating system commands which are then executed on the device with the highest level of privileges.

Business impact

This is a high-severity vulnerability with a CVSS score of 8.8. Exploitation of this flaw can have a significant negative impact on the business. A successful attack would grant an adversary complete control over the network device, leading to severe consequences such as the ability to monitor, redirect, or block all network traffic, gain a foothold for lateral movement into the corporate network, exfiltrate sensitive data, or disrupt critical business operations. A compromised perimeter device could also be used to launch attacks against other organizations, causing significant reputational damage.

Remediation

Immediate Action: Apply vendor security updates immediately. Organizations should prioritize patching internet-facing devices to eliminate the vulnerability. After patching, it is crucial to monitor for any further exploitation attempts and review access logs for any signs of compromise that may have occurred prior to the update.

Proactive Monitoring: Security teams should actively monitor for indicators of compromise. Review web server logs for the affected devices for unusual requests, particularly those containing shell metacharacters (e.g., ;, |, &&, $()). Monitor network traffic for unexpected outbound connections from the management interface of the device, which could indicate a successful compromise.

Compensating Controls: If patching is not immediately possible, implement the following controls to reduce risk:

  • Restrict all access to the device's web management interface to a secure, isolated management network.
  • If remote access is required, use a VPN and enforce strict firewall rules to only allow connections from trusted IP addresses.
  • Deploy a Web Application Firewall (WAF) with rules to detect and block command injection attempts against the device.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the potential for complete system compromise by an unauthenticated attacker, this vulnerability poses a critical risk to the organization. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity warrants immediate attention. We strongly advise that all organizations using the affected products apply the vendor-supplied security updates as a top priority. If patching cannot be performed immediately, the compensating controls listed above must be implemented without delay to mitigate the risk of exploitation.