CVE-2025-70998: UTT HiPER
CVE-2025-70998
UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a craft...
Security Advisory: Critical Vulnerability in UTT HiPER Router Firmware
Overview
A critical security vulnerability has been identified in certain UTT HiPER router models. The flaw resides in the device’s firmware and involves the use of insecure default credentials for the Telnet remote access service. This means the router ships with a pre-set, easily guessable username and password that cannot be changed by the user, creating a permanent backdoor.
Vulnerability Details
The affected UTT HiPER 810 / nv810v4 router runs firmware version v1.5.0-140603. The Telnet service on this device, which allows for remote command-line administration, is protected by weak, hard-coded login credentials. Because these defaults are embedded in the firmware and not intended for user modification, an attacker can reliably use them to gain access.
Impact and Risk Assessment
This vulnerability is rated CRITICAL with a CVSS score of 9.8. The potential impact is severe:
- Full System Compromise: A remote attacker can use a simple automated script to log into the Telnet service with the known default credentials and obtain root-level access to the router.
- Network Takeover: With root access, an attacker can reconfigure the router, intercept or redirect all network traffic (eavesdropping), disable security settings, and use the device as a launch point for attacks on the internal network.
- Persistence: The flaw is in the firmware itself, making the backdoor persistent across reboots and routine configuration changes.
Affected Products
- Model: UTT HiPER 810 / nv810v4
- Firmware Version: v1.5.0-140603
- Other firmware versions and models may also be affected and should be verified.
Remediation and Mitigation Steps
Immediate action is required for all administrators of potentially affected devices.
-
Primary Solution - Firmware Update: Contact the device vendor (UTT) immediately to inquire about the availability of a patched firmware version. Apply any official updated firmware as soon as it is provided. This is the only way to permanently remove the hard-coded credentials.
-
Critical Interim Mitigation - Disable Telnet:
- Log into the router’s web administration interface.
- Navigate to the remote management or services section.
- Disable the Telnet service entirely. If remote administration is necessary, use a more secure protocol like SSH (if supported and properly configured with strong passwords).
-
Network Segmentation: If the router cannot be immediately updated or Telnet cannot be disabled, isolate it on a network segment to limit potential lateral movement in case of compromise. Restrict access to its management interface using firewall rules to only trusted administrative IP addresses, if the device supports this feature.
-
Monitor for Compromise: Review router logs for unexpected Telnet login attempts or unauthorized configuration changes. Monitor internal network traffic for unusual patterns indicating a breach.
Note: Simply changing the web admin password will not fix this vulnerability, as the Telnet credentials are separate and hard-coded into the firmware.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. From 3.0.0 to before 3.1.0, if Himmelblau is deployed without a configured tenant domain in himmelblau.conf, authentica...
A critical remote code execution vulnerability in Example Software allows attackers to execute arbitrary code...
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 12 (JumpToUser) accepts an arbitrary entry point address from user-space registers witho...
Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14, Hot Chocolate's recursive descent parser `Utf8GraphQLParser` has no recursion depth limit. A cr...