Skip to content

Commit de45639

Browse files
1 parent b2b76ed commit de45639

File tree

2 files changed

+112
-0
lines changed

2 files changed

+112
-0
lines changed
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-c95h-vj6h-jv2w",
4+
"modified": "2025-12-06T18:30:11Z",
5+
"published": "2025-12-06T18:30:11Z",
6+
"aliases": [
7+
"CVE-2025-14140"
8+
],
9+
"details": "A vulnerability was detected in UTT 进取 520W 1.7.7-180627. The affected element is the function strcpy of the file /goform/websHostFilter. Performing manipulation of the argument addHostFilter results in buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14140"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/cymiao1978/cve/blob/main/new/12.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/cymiao1978/cve/blob/main/new/12.md#poc"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.334528"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.334528"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.698521"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-119"
50+
],
51+
"severity": "HIGH",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-12-06T16:15:46Z"
55+
}
56+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-j4h8-5mrq-r8gg",
4+
"modified": "2025-12-06T18:30:11Z",
5+
"published": "2025-12-06T18:30:11Z",
6+
"aliases": [
7+
"CVE-2025-14141"
8+
],
9+
"details": "A flaw has been found in UTT 进取 520W 1.7.7-180627. The impacted element is the function strcpy of the file /goform/formArpBindConfig. Executing manipulation of the argument pools can lead to buffer overflow. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14141"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/cymiao1978/cve/blob/main/new/13.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/cymiao1978/cve/blob/main/new/13.md#poc"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.334529"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.334529"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.698522"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-119"
50+
],
51+
"severity": "HIGH",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-12-06T16:15:47Z"
55+
}
56+
}

0 commit comments

Comments
 (0)