Impact
A buffer overflow occurs in the strcpy function used by the /goform/formFireWall endpoint when processing the GroupName argument. The vulnerability allows an attacker to send a specially crafted request that overflows the buffer, potentially overwriting adjacent memory and achieving arbitrary code execution.
Affected Systems
The flaw affects UTT 进取 520W, specifically firmware version 1.7.7-180627. This flaw is present in the 520W device family and applies to any deployment of the stated firmware.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity, and the EPSS score below 1% suggests low current exploitation probability, yet a public exploit is already available. The vulnerability can be triggered remotely without authentication, and the device is not part of the CISA KEV catalog. A device exposed to the Internet or weakly protected internal network poses a significant risk of compromise, making timely remediation essential.
OpenCVE Enrichment