CVE-2026-7674: Libituo LBT-T300-HW1 Buffer Overflow Poses Remote Risk

CVE-2026-7674: Libituo LBT-T300-HW1 Buffer Overflow Poses Remote Risk

A critical buffer overflow vulnerability, identified as CVE-2026-7674, has been discovered in Shenzhen Libituo Technology’s LBT-T300-HW1 router, affecting versions up to 1.2.8. The National Vulnerability Database reports that this flaw resides in the Web Management Interface’s start_single_service function.

Attackers can remotely exploit this by manipulating the vpn_pptp_server or vpn_l2tp_server arguments. This leads to a buffer overflow, with a CVSSv3.1 score of 8.8 (HIGH), indicating high impact on confidentiality, integrity, and availability. The National Vulnerability Database notes that the vendor has not responded to disclosure attempts.

This vulnerability is a stark reminder that network edge devices are prime targets. Unpatched routers are low-hanging fruit for initial access. An attacker gaining control of a router can pivot into the internal network, intercept traffic, or establish persistence, bypassing perimeter defenses designed for internal systems.

What This Means For You

  • If your organization uses Shenzhen Libituo Technology LBT-T300-HW1 routers, immediately verify your firmware version. If it's 1.2.8 or earlier, assume it's vulnerable. Given the vendor's non-responsiveness, consider isolating these devices or replacing them entirely. Audit network traffic for unusual activity originating from or destined for these routers.

Related ATT&CK Techniques

🛡️ Detection Rules

5 rules · 6 SIEM formats

5 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-7674

Sigma YAML — free preview
title: Web Application Exploitation Attempt — CVE-2026-7674
id: scw-2026-05-03-1
status: experimental
level: high
description: |
  Detects common exploitation patterns targeting web applications. Review CVE-2026-7674 advisories for specific indicators.
author: SCW Feed Engine (auto-generated)
date: 2026-05-03
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-7674/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri-query|contains:
        - '..'
        - 'SELECT'
        - 'UNION'
        - '<script'
        - 'cmd='
        - '/etc/passwd'
      condition: selection
falsepositives:
  - Legitimate activity from CVE-2026-7674

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-7674 Buffer Overflow Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8
CVE-2026-7674 Buffer Overflow Web Management Interface function start_single_service
CVE-2026-7674 Buffer Overflow Manipulation of argument vpn_pptp_server/vpn_l2tp_server
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 03, 2026 at 05:17 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-7675: Shenzhen Libituo LBT-T300-HW1 Buffer Overflow Exposed

CVE-2026-7675 — A vulnerability has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. Impacted is the function start_lan of the file /apply.cgi. The...

vulnerabilityCVEhigh-severitybuffer-overflowcwe-119cwe-120
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 3 IOCs /⚙ 2 Sigma

CVE-2026-7673 — Crmeb_java Unrestricted File Upload

CVE-2026-7673 — A vulnerability was detected in crmeb_java up to 1.3.4. This vulnerability affects unknown code of the file crmeb/crmeb-service/src/main/java/com/zbkj/service/service/impl/UploadServiceImpl.java of the component Admin Upload....

vulnerabilityCVEmedium-severityunrestricted-file-uploadcwe-284cwe-434
/SCW Vulnerability Desk /MEDIUM /4.7 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-7672 — Youlaitech Youlai-Boot SQL Injection

CVE-2026-7672 — A security vulnerability has been detected in youlaitech youlai-boot up to 2.21.1. This affects the function getUserList of the file src/main/java/com/youlai/boot/system/controller/UserController.java of the...

vulnerabilityCVEmedium-severitysql-injectioncwe-74cwe-89
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 3 IOCs /⚙ 3 Sigma