Description
A vulnerability has been found in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/ConfigExceptMSN. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-19
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Now
AI Analysis

Impact

The vulnerability resides in the strcpy implementation used by the UTT 520W device. A remote attacker can craft a specially sized input sent to the /goform/ConfigExceptMSN interface, causing a buffer overflow. This overflow can be exploited to overwrite control data and ultimately allow code execution with the privileges of the device. The weakness is a classic unchecked buffer copy, corresponding to CWE‑119 and CWE‑120, and its impact is the potential compromise of confidentiality, integrity, and availability of the affected system.

Affected Systems

The affected product is UTT 520W, specifically firmware version 1.7.7-180627. The device runs on a hardware platform identified as 520W with firmware release 3.0. Any installation of this firmware or earlier releases that have not been updated is vulnerable.

Risk and Exploitability

The CVSS base score is 8.7, indicating high severity. The EPSS score of <1% suggests a very low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. However, the public‑disclosed exploit and the lack of vendor response mean that an attacker could successfully deploy this overflow from a remote network if the vulnerable interface is reachable. The attack vector is inferred to be remote network traffic to the device’s web interface, leading to a remote code execution scenario.

Generated by OpenCVE AI on April 18, 2026 at 05:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and apply the latest firmware update that replaces the unsafe strcpy with a bounds‑checked function.
  • Restrict access to the /goform/ConfigExceptMSN endpoint, limiting it to trusted internal networks or whitelisted IP addresses.
  • Implement network segmentation and firewall rules to isolate the device from untrusted traffic, and monitor for oversized input attempts.

Generated by OpenCVE AI on April 18, 2026 at 05:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Utt 520w Firmware
CPEs cpe:2.3:h:utt:520w:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:520w_firmware:*:*:*:*:*:*:*:*
Vendors & Products Utt 520w Firmware

Tue, 20 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt 520w
Vendors & Products Utt
Utt 520w

Mon, 19 Jan 2026 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/ConfigExceptMSN. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title UTT 进取 520W ConfigExceptMSN strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:42:17.706Z

Reserved: 2026-01-18T07:29:54.370Z

Link: CVE-2026-1139

cve-icon Vulnrichment

Updated: 2026-01-20T21:25:38.250Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T05:16:09.303

Modified: 2026-02-04T20:41:41.790

Link: CVE-2026-1139

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses