Description
A flaw has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. This issue affects the function start_single_service of the component Web Management Interface. Executing a manipulation of the argument vpn_pptp_server/vpn_l2tp_server can lead to buffer overflow. The attack can be executed remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-03
Score: 8.7 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A buffer overflow flaw exists in the Shenzhen Libituo Technology LBT‑T300‑HW1 firmware, affecting the start_single_service function of the Web Management Interface. The vulnerability is triggered by manipulating the vpn_pptp_server or vpn_l2tp_server arguments, causing an overflow of an internal buffer. Because this function can be invoked remotely via the web interface, an attacker could cause a crash or potentially execute arbitrary code, compromising the device fully. The weakness is categorized as CWE-119 and CWE-120 – unbounded buffer writes caused by unsanitized input.

Affected Systems

The affected device is the Shenzhen Libituo Technology LBT‑T300‑HW1 router. Firmware versions up to 1.2.8 contain the flaw. No newer firmware releases have been reported to include a fix at this time.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.7, indicating high severity. EPSS data is not available, so exploitation probability cannot be quantified; however, the high CVSS and remote attack vector imply significant risk. The flaw is not listed in the CISA KEV catalog. Attackers would need network reachability to the device’s management interface; authentication is not described as bypassable, so a valid user session is likely required.

Generated by OpenCVE AI on May 3, 2026 at 03:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install the latest firmware revision that addresses the buffer overflow.
  • Restrict access to the device’s Web Management Interface to trusted subnets or VPN endpoints, limiting exposure to external remote attackers.
  • Disable or remove the unused VPN services (vpn_pptp_server/vpn_l2tp_server) if the device configuration permits until a patch is applied.

Generated by OpenCVE AI on May 3, 2026 at 03:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 03 May 2026 02:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. This issue affects the function start_single_service of the component Web Management Interface. Executing a manipulation of the argument vpn_pptp_server/vpn_l2tp_server can lead to buffer overflow. The attack can be executed remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Title Shenzhen Libituo Technology LBT-T300-HW1 Web Management start_single_service buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:ND/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-03T01:30:14.156Z

Reserved: 2026-05-02T08:30:55.245Z

Link: CVE-2026-7674

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-03T02:17:12.993

Modified: 2026-05-03T02:17:12.993

Link: CVE-2026-7674

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-03T04:00:12Z

Weaknesses