Impact
The vulnerability is a buffer overflow caused by an unsafe strcpy call in the formWebAuthGlobalConfig handler. The flaw can be triggered by sending an oversized input, which may allow the attacker to overwrite memory boundaries and potentially execute arbitrary code, granting full control over the device. The flaw is captured by CWE-119 and CWE-120 and the public exploit indicates that the attack can be performed remotely.
Affected Systems
This issue affects the UTT 进取 520W router, specifically firmware version 1.7.7-180627. The CPE entries list the hardware SKU 520w and the associated firmware. Any device running this firmware is vulnerable; earlier versions may not be affected, but operators should verify their specific build numbers.
Risk and Exploitability
The CVSS score of 8.7 reflects high severity, and the EPSS score of less than 1% indicates a low probability of widespread exploitation at this time, although the presence of a publicly available exploit means that targeted attacks are feasible. The vulnerability is not yet included in the CISA KEV catalog, but remote attackers can leverage the overflow by sending crafted HTTP requests to the affected endpoint without authentication, implying that the attack surface is broad and the damage potential is significant.
OpenCVE Enrichment