A vulnerability classified as critical has been found in Shenzhen Libituo Technology LBT-T300-T310 up to 2.2.3.6. This affects the function config_3g_para of the file /appy.cgi. The manipulation of the argument username_3g/password_3g leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/FLY200503/IoT-vul/tree/master/LBT-T300 | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.314991 | Permissions Required VDB Entry |
| https://vuldb.com/?id.314991 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.603012 | Third Party Advisory VDB Entry |
| https://github.com/FLY200503/IoT-vul/tree/master/LBT-T300 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-07-06 07:15
Updated : 2025-08-20 16:30
NVD link : CVE-2025-7077
Mitre link : CVE-2025-7077
CVE.ORG link : CVE-2025-7077
JSON object : View
Products Affected
szlbt
- lbt-t300-t310_firmware
- lbt-t300-t310
