Description
A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. Affected by this vulnerability is the function strcpy of the file /goform/formConfigNoticeConfig. The manipulation of the argument timestart leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-11
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow
Action: Apply Patch
AI Analysis

Impact

A buffer overflow occurs in the strcpy call within /goform/formConfigNoticeConfig on UTT 进取 520W firmware 1.7.7-180627. The timestart parameter is not validated, enabling an attacker to overflow a fixed‑size buffer and corrupt memory. This can lead to remote code execution or arbitrary code injection, compromising the device’s confidentiality, integrity, and availability.

Affected Systems

The affected product is UTT 进取 520W, specifically firmware version 1.7.7‑180627. The vulnerability resides in the formConfigNoticeConfig function and applies to all units running this firmware. The device model is the 520W hardware, and the vulnerability affects the corresponding firmware family.

Risk and Exploitability

The CVSS base score of 8.7 indicates high severity, while the EPSS score is below 1%, suggesting a low probability of exploitation at present. An exploit is publicly disclosed, and the vendor has not responded to the vulnerability disclosure, leaving devices potentially unpatched. The attack vector is remote, over HTTP, and an attacker can trigger the overflow by sending a crafted timestart value to the vulnerable endpoint.

Generated by OpenCVE AI on April 18, 2026 at 16:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest available firmware update that addresses the strcpy buffer overflow.
  • Block or remove external access to the /goform/formConfigNoticeConfig endpoint using firewall rules or by disabling the web interface if it is not required for operation.
  • Implement network segmentation so that the device is isolated from untrusted networks, thereby limiting potential remote exploitation.

Generated by OpenCVE AI on April 18, 2026 at 16:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 13 Jan 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt 520w Firmware
CPEs cpe:2.3:h:utt:520w:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:520w_firmware:*:*:*:*:*:*:*:*
Vendors & Products Utt 520w Firmware

Mon, 12 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 12 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt 520w
Vendors & Products Utt
Utt 520w

Sun, 11 Jan 2026 06:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. Affected by this vulnerability is the function strcpy of the file /goform/formConfigNoticeConfig. The manipulation of the argument timestart leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title UTT 进取 520W formConfigNoticeConfig strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:30:04.197Z

Reserved: 2026-01-10T09:50:47.359Z

Link: CVE-2026-0840

cve-icon Vulnrichment

Updated: 2026-01-12T14:34:34.789Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-11T07:15:49.680

Modified: 2026-01-13T21:56:28.297

Link: CVE-2026-0840

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:30:05Z

Weaknesses