CVE-2025-70998: UTT HiPER
CVE-2025-70998
Remote attackers exploit hard-coded Telnet credentials for root access on UTT HiPER 810 firmware v1.5.0-140603. Disable Telnet immediately; contact vendor for firmware update.
Patch now - CVE-2025-70998 is a critical hard-coded credential backdoor in UTT HiPER 810 / nv810v4 routers with firmware version v1.5.0-140603 that grants unauthenticated remote attackers root-level access via Telnet. Disable the Telnet service immediately as an interim mitigation until a patched firmware is applied.
Security Advisory: Critical Vulnerability in UTT HiPER Router Firmware
Overview
A critical security vulnerability has been identified in certain UTT HiPER router models. The flaw resides in the device’s firmware and involves the use of insecure default credentials for the Telnet remote access service. This means the router ships with a pre-set, easily guessable username and password that cannot be changed by the user, creating a permanent backdoor.
Vulnerability Details
The affected UTT HiPER 810 / nv810v4 router runs firmware version v1.5.0-140603. The Telnet service on this device, which allows for remote command-line administration, is protected by weak, hard-coded login credentials. Because these defaults are embedded in the firmware and not intended for user modification, an attacker can reliably use them to gain access.
Impact and Risk Assessment
This vulnerability is rated CRITICAL with a CVSS score of 9.8. The potential impact is severe:
- Full System Compromise: A remote attacker can use a simple automated script to log into the Telnet service with the known default credentials and obtain root-level access to the router.
- Network Takeover: With root access, an attacker can reconfigure the router, intercept or redirect all network traffic (eavesdropping), disable security settings, and use the device as a launch point for attacks on the internal network.
- Persistence: The flaw is in the firmware itself, making the backdoor persistent across reboots and routine configuration changes.
Affected Products
- Model: UTT HiPER 810 / nv810v4
- Firmware Version: v1.5.0-140603
- Other firmware versions and models may also be affected and should be verified.
Remediation and Mitigation Steps
Immediate action is required for all administrators of potentially affected devices.
-
Primary Solution - Firmware Update: Contact the device vendor (UTT) immediately to inquire about the availability of a patched firmware version. Apply any official updated firmware as soon as it is provided. This is the only way to permanently remove the hard-coded credentials.
-
Critical Interim Mitigation - Disable Telnet:
- Log into the router’s web administration interface.
- Navigate to the remote management or services section.
- Disable the Telnet service entirely. If remote administration is necessary, use a more secure protocol like SSH (if supported and properly configured with strong passwords).
-
Network Segmentation: If the router cannot be immediately updated or Telnet cannot be disabled, isolate it on a network segment to limit potential lateral movement in case of compromise. Restrict access to its management interface using firewall rules to only trusted administrative IP addresses, if the device supports this feature.
-
Monitor for Compromise: Review router logs for unexpected Telnet login attempts or unauthorized configuration changes. Monitor internal network traffic for unusual patterns indicating a breach.
Note: Simply changing the web admin password will not fix this vulnerability, as the Telnet credentials are separate and hard-coded into the firmware.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
OpenClaw before 2026.4.10 contains an improper network binding vulnerability in the sandbox browser CDP relay that exposes Chrome DevTools Protocol on 0.0.0.0. Attackers can access the DevTools protoc...
BridgeHead FileStore versions prior to 24A (released in early 2024) expose the Apache Axis2 administration module on network-accessible endpoints with default credentials that allows unauthenticated r...
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. From 3.0.0 to before 3.1.0, if Himmelblau is deployed without a configured tenant domain in himmelblau.conf, authentica...
A critical remote code execution vulnerability in Example Software allows attackers to execute arbitrary code...