CVE-2025-15090

was · was Multiple Products

A high-severity vulnerability has been identified in was Multiple Products, specifically affecting UTT 进取 512W network devices.

Executive summary

A high-severity vulnerability has been identified in was Multiple Products, specifically affecting UTT 进取 512W network devices. This flaw, with a CVSS score of 8.8, could allow a remote, unauthenticated attacker to execute arbitrary code and gain complete control over the affected device. Successful exploitation could lead to significant network disruption, data interception, and unauthorized access to internal network resources.

Vulnerability

Based on the high CVSS score, this vulnerability is likely a critical flaw, such as an unauthenticated command injection or remote code execution vulnerability in the device's web management interface. An attacker could potentially send a specially crafted network packet or HTTP request to the device's management portal. This request could exploit a lack of input sanitization to inject and execute arbitrary commands on the underlying operating system, likely with administrative (root) privileges, without needing valid credentials.

Business impact

This vulnerability presents a significant risk to the organization, classified as High severity with a CVSS score of 8.8. A successful exploit would grant an attacker full control over a critical network infrastructure device. This could lead to severe consequences, including the ability to monitor, redirect, or block all network traffic, resulting in a breach of sensitive data confidentiality and integrity. The compromised device could also serve as a persistent foothold for an attacker to pivot and launch further attacks against the internal corporate network, potentially leading to widespread system compromise, operational downtime, and reputational damage.

Remediation

Immediate Action: Apply vendor security updates immediately. System administrators should identify all affected devices and schedule a maintenance window to deploy the patches as soon as possible, prioritizing internet-facing systems. After patching, monitor for any signs of exploitation attempts and review historical access logs for indicators of compromise.

Proactive Monitoring: Implement enhanced monitoring for the affected devices. Scrutinize web server and firewall logs for unusual or malformed requests targeting the device's management interface. Monitor for unexpected outbound network connections originating from the device and enable alerts for any unauthorized configuration changes or the creation of new user accounts.

Compensating Controls: If immediate patching is not feasible, restrict all access to the device's management interface to a secure, isolated management network or specific trusted IP addresses. If the interface must remain accessible, place it behind a Web Application Firewall (WAF) configured with rules to detect and block command injection and other common web attack patterns.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 8.8) of this vulnerability, we strongly recommend that immediate action be taken to mitigate this risk. Organizations must prioritize the deployment of the vendor-provided security updates to all affected UTT devices, starting with those exposed to the internet. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its critical nature warrants an urgent response to prevent potential exploitation and safeguard the network from a complete compromise.