CVE-2025-15091
was · was Multiple Products
A high-severity vulnerability has been identified in certain UTT network devices, allowing an unauthenticated remote attacker to potentially gain complete control over the affected system.
Executive summary
A high-severity vulnerability has been identified in certain UTT network devices, allowing an unauthenticated remote attacker to potentially gain complete control over the affected system. Successful exploitation could lead to network traffic interception, unauthorized access to internal networks, and full system compromise, posing a significant risk to network security and data confidentiality.
Vulnerability
The vulnerability is an unauthenticated command injection flaw in the device's web management interface. An attacker can send a specially crafted HTTP request to a specific, exposed endpoint on the device. The application fails to properly sanitize user-supplied input within this request, allowing an attacker to inject arbitrary operating system commands which are then executed on the device with the privileges of the web server process, potentially leading to a full system compromise.
Business impact
This vulnerability presents a significant business risk, categorized as High severity with a CVSS score of 8.8. Exploitation by a remote, unauthenticated attacker could result in a complete compromise of the network gateway. Potential consequences include interception and theft of sensitive data passing through the network, disruption of network services leading to operational downtime, and the use of the compromised device as a pivot point to launch further attacks against the internal corporate network.
Remediation
Immediate Action: Identify all affected devices within the environment and apply the security updates provided by the vendor immediately. After patching, review system and access logs for any signs of compromise or anomalous activity that may have occurred prior to the update.
Proactive Monitoring: Configure network monitoring and security information and event management (SIEM) systems to detect potential exploitation attempts. Specifically, monitor for unusual or malformed HTTP requests to the device's management interface, especially those containing shell command characters (e.g., ;, |, &&, $()). Also, monitor for unexpected outbound connections originating from the network device itself.
Compensating Controls: If immediate patching is not feasible, restrict access to the device's web management interface to a dedicated, trusted management network or specific IP addresses. Ensure the management interface is not exposed to the public internet. A Web Application Firewall (WAF) could also be configured with rules to block requests containing common command injection patterns.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Due to the high CVSS score of 8.8 and the critical role of these network devices, this vulnerability should be treated as a top priority for remediation. The potential for unauthenticated remote code execution presents a direct threat to the network perimeter. We strongly recommend that organizations apply the vendor-supplied patches on an emergency basis. While this CVE is not currently on the CISA KEV list, its characteristics make it a prime candidate for future inclusion, underscoring the urgency of immediate action.