Impact
A buffer overflow vulnerability exists in the strcpy function used by the /goform/APSecurity endpoint of UTT 进取 520W. The flaw allows an attacker to manipulate the wepkey1 parameter and overflow a buffer, potentially leading to remote code execution. The weakness is catalogued as CWE-119 (Buffer Access with Incorrect Length Value) and CWE-120 (Buffer Copy without Length Check).
Affected Systems
The affected product is UTT 进取 520W firmware version 1.7.7-180627. The vulnerability is present in the specified build of the device firmware and could affect any unit running that firmware.
Risk and Exploitability
The CVSS score of 8.7 indicates severe impact. EPSS is reported as less than 1%, suggesting a low current exploitation probability, but a public exploit is available. The attack vector is inferred to be remote, likely over the network via the web interface, as the descriptors mention manipulation from remote. The vulnerability has not been listed in CISA's KEV catalog, but its potential for remote code execution warrants proactive mitigation.
OpenCVE Enrichment