Impact
A buffer overflow occurs in the strcpy function inside the /goform/formConfigFastDirectionW handler of UTT 进取 520W firmware 1.7.7-180627. The overflow is triggered by manipulating the ssid argument. The vulnerability falls under CWE-119 and CWE-120 and allows an attacker to corrupt memory, potentially leading to arbitrary code execution. The impact is a loss of confidentiality, integrity, and availability of the affected device, enabling full remote compromise.
Affected Systems
The vulnerability affects UTT 进取 520W devices running firmware version 1.7.7-180627. It corresponds to the hardware model 520W with firmware 1.7.7-180627. No other vendors or products are listed.
Risk and Exploitability
The CVSS score of 8.7 classifies the flaw as high severity, while the EPSS score of less than 1% suggests a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be remote, with an attacker sending a specially crafted HTTP request to the vulnerable web interface. No straightforward prerequisites are described, indicating that any network user could potentially trigger the overflow if they can reach the device.
OpenCVE Enrichment