Description
A vulnerability was detected in UTT 进取 520W 1.7.7-180627. Affected by this issue is the function strcpy of the file /goform/formPictureUrl. The manipulation of the argument importpictureurl results in buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-11
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow occurs when the strcpy function in the formPictureUrl handler processes the importpictureurl parameter without proper bounds checking, allowing an attacker to inject arbitrary data into memory. The vulnerability involves two well‑known weaknesses, buffer overflow (CWE‑119) and unsafe string copy (CWE‑120), and can result in application crash or arbitrary code execution. Because the flaw is triggered by a remote request, an attacker can potentially exploit it from outside the network, leading to loss of confidentiality, integrity, or availability depending on the device configuration.

Affected Systems

The affected product is UTT 进取 520W running firmware version 1.7.7‑180627. The same firmware application exposes the vulnerable endpoint on /goform/formPictureUrl. Earlier firmware releases prior to 1.7.7‑180627 may also be susceptible, but the CVE explicitly references the 1.7.7‑180627 build.

Risk and Exploitability

The CVSS v3.1 base score of 8.7 indicates high severity. The EPSS probability is reported as less than 1 %, suggesting low likelihood of widespread exploitation at present, but the vulnerability is publicly disclosed and the exploit exists, so the risk remains. The CVE is not yet listed in the CISA KEV catalogue. Exploitation appears to be straightforward: a remote actor sends a crafted importpictureurl value to the web interface, which triggers the vulnerable strcpy call and overwrites the stack or heap memory, potentially allowing code execution or denial of service. Successful exploitation therefore requires network access to the device’s web interface and does not necessitate additional privileges.

Generated by OpenCVE AI on April 18, 2026 at 07:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official firmware update that patches the strcpy buffer overflow in the formPictureUrl handler.
  • Block or limit external access to the /goform/formPictureUrl endpoint using firewall rules, VPN, or internal network segmentation to reduce the attack surface.
  • Verify that the importpictureurl parameter is validated for length and content before being processed; enforce strict input checks to prevent overflow.

Generated by OpenCVE AI on April 18, 2026 at 07:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 13 Jan 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt 520w Firmware
CPEs cpe:2.3:h:utt:520w:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:520w_firmware:*:*:*:*:*:*:*:*
Vendors & Products Utt 520w Firmware

Mon, 12 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 12 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt 520w
Vendors & Products Utt
Utt 520w

Sun, 11 Jan 2026 07:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in UTT 进取 520W 1.7.7-180627. Affected by this issue is the function strcpy of the file /goform/formPictureUrl. The manipulation of the argument importpictureurl results in buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title UTT 进取 520W formPictureUrl strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:30:15.999Z

Reserved: 2026-01-10T09:50:50.309Z

Link: CVE-2026-0841

cve-icon Vulnrichment

Updated: 2026-01-12T14:33:12.075Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-11T08:15:59.153

Modified: 2026-01-13T21:55:32.140

Link: CVE-2026-0841

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T07:15:25Z

Weaknesses