Impact
A buffer overflow occurs during the handling of the ssid argument in the strcpy function within the /goform/ConfigWirelessBase routine. The vulnerability, identified as CWE-119 and CWE-120, allows an attacker to provide an ssid string that exceeds the allocated buffer size, potentially enabling arbitrary code execution or a system crash. The flaw is reachable remotely through the web interface, and public exploits have been released.
Affected Systems
The affected product is the UTT 进取 520W router running firmware version 1.7.7‑180627. No other versions are listed as impacted in the documented data.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity condition. The EPSS score is reported as less than 1%, suggesting current exploitation probability is low but non‑zero, which may rise over time as the exploit becomes more widely known. The vulnerability is not currently listed in the CISA KEV catalog, but the existence of public exploit code means the risk has become actionable. It can be triggered without local network presence, simply by sending crafted requests to the exposed web interface.
OpenCVE Enrichment