CVE-2025-8019

A vulnerability was found in Shenzhen Libituo Technology LBT-T300-T310 2.2.3.6. It has been rated as critical. Affected by this issue is the function sub_40B6F0 of the file at/appy.cgi. The manipulation of the argument wan_proto leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:szlbt:lbt-t300-t310_firmware:2.2.3.6:*:*:*:*:*:*:*
cpe:2.3:h:szlbt:lbt-t300-t310:-:*:*:*:*:*:*:*

History

20 Aug 2025, 20:14

Type Values Removed Values Added
CPE cpe:2.3:o:szlbt:lbt-t300-t310_firmware:2.2.3.6:*:*:*:*:*:*:*
cpe:2.3:h:szlbt:lbt-t300-t310:-:*:*:*:*:*:*:*
First Time Szlbt
Szlbt lbt-t300-t310 Firmware
Szlbt lbt-t300-t310
References () https://github.com/turing-wue/IoT-vul/blob/main/LBT-T300/README.md - () https://github.com/turing-wue/IoT-vul/blob/main/LBT-T300/README.md - Exploit, Third Party Advisory
References () https://github.com/turing-wue/IoT-vul/blob/main/LBT-T300/README.md#payload - () https://github.com/turing-wue/IoT-vul/blob/main/LBT-T300/README.md#payload - Exploit
References () https://vuldb.com/?ctiid.317222 - () https://vuldb.com/?ctiid.317222 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.317222 - () https://vuldb.com/?id.317222 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.619530 - () https://vuldb.com/?submit.619530 - Third Party Advisory, VDB Entry

23 Jul 2025, 15:15

Type Values Removed Values Added
References () https://github.com/turing-wue/IoT-vul/blob/main/LBT-T300/README.md - () https://github.com/turing-wue/IoT-vul/blob/main/LBT-T300/README.md -
References () https://github.com/turing-wue/IoT-vul/blob/main/LBT-T300/README.md#payload - () https://github.com/turing-wue/IoT-vul/blob/main/LBT-T300/README.md#payload -
Summary
  • (es) Se encontró una vulnerabilidad en Shenzhen Libituo Technology LBT-T300-T310 2.2.3.6. Se ha clasificado como crítica. Este problema afecta a la función sub_40B6F0 del archivo at/appy.cgi. La manipulación del argumento wan_proto provoca un desbordamiento del búfer. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.

22 Jul 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-22 16:15

Updated : 2025-08-20 20:14


NVD link : CVE-2025-8019

Mitre link : CVE-2025-8019

CVE.ORG link : CVE-2025-8019


JSON object : View

Products Affected

szlbt

  • lbt-t300-t310_firmware
  • lbt-t300-t310
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')