Description
A flaw has been found in UTT 进取 520W 1.7.7-180627. This affects the function strcpy of the file /goform/ConfigExceptQQ. Executing a manipulation can lead to buffer overflow. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-19
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Assess Impact
AI Analysis

Impact

A buffer overflow flaw exists in the strcpy call within the /goform/ConfigExceptQQ handler of UTT 进取 520W firmware 1.7.7‑180627. When an attacker sends a specially crafted request to that endpoint, the overflow can overwrite adjacent memory, enabling the levered execution of arbitrary code on the device. The weakness is categorized as CWE‑119 (improper restriction of operations performed on a buffer) and CWE‑120 (buffer copy without checking length). Such a loss of control can compromise the confidentiality, integrity, and availability of the device, and because the affected interface is reachable from external hosts, the impact extends to the entire network the device protects.

Affected Systems

The vulnerability affects the UTT 进取 520W router, specifically firmware version 1.7.7‑180627. No other firmware revisions are listed as vulnerable. The affected product is identified by the vendor URL vendor name “UTT:进取 520W.”

Risk and Exploitability

The CVSS score of 8.7 marks this as a high‑severity vulnerability, and the EPSS score of <1% indicates that the likelihood of exploitation in the wild is currently low, although an exploit package has already been published. The vulnerability is not yet catalogued in the CISA KEV list. Attackers can exploit it directly from remote hosts via the web management interface, without additional access, which makes the risk significant for exposed devices. Because the vendor has not released a patch, the exposure remains for any client that continues running the affected firmware version.

Generated by OpenCVE AI on April 18, 2026 at 05:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Block external access to the device’s management interface by placing the device behind a firewall or implementing VLAN segmentation
  • If an updated firmware version containing the fix becomes available, plan a timely upgrade; otherwise consider replacement with a supported product
  • Deploy continuous monitoring of device logs and network traffic for signs of exploitation attempts such as abnormal POST requests to the /goform/ConfigExceptQQ endpoint

Generated by OpenCVE AI on April 18, 2026 at 05:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Utt 520w Firmware
CPEs cpe:2.3:h:utt:520w:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:520w_firmware:*:*:*:*:*:*:*:*
Vendors & Products Utt 520w Firmware

Tue, 20 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt 520w
Vendors & Products Utt
Utt 520w

Mon, 19 Jan 2026 05:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in UTT 进取 520W 1.7.7-180627. This affects the function strcpy of the file /goform/ConfigExceptQQ. Executing a manipulation can lead to buffer overflow. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title UTT 进取 520W ConfigExceptQQ strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:42:05.895Z

Reserved: 2026-01-18T07:29:51.730Z

Link: CVE-2026-1138

cve-icon Vulnrichment

Updated: 2026-01-20T21:25:02.641Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T05:16:09.100

Modified: 2026-02-04T20:40:46.953

Link: CVE-2026-1138

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses