Description
A vulnerability was found in UTT 进取 520W 1.7.7-180627. This issue affects the function strcpy of the file /goform/ConfigExceptAli. The manipulation results in buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-19
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises from a buffer overflow in the strcpy function used by the /goform/ConfigExceptAli component of UTT 进取 520W firmware. The flaw allows an attacker to write beyond the bounds of the destination buffer, leading to potential arbitrary code execution, making the device susceptible to complete compromise. The weakness is classified as CWE-119 and CWE-120, reflecting improper bounds checking and classic buffer overflow issues.

Affected Systems

The affected product is UTT 进取 520W, specifically firmware version 1.7.7-180627. Only this release is known to contain the vulnerable strcpy handler in the ConfigExceptAli endpoint.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity vulnerability, while the EPSS score is reported as less than 1% suggesting a low current exploitation probability. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The description confirms that the attack can be launched remotely, and the exploit has been made public. The likely attack vector is an unauthenticated remote request targeting the vulnerable /goform/ConfigExceptAli interface, which may allow an attacker to supply oversized input and trigger the overflow.

Generated by OpenCVE AI on April 18, 2026 at 05:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the device firmware version to confirm it is 1.7.7-180627 and look for any vendor-released updates that address the ConfigExceptAli buffer overflow.
  • If an official patch or firmware update is available, apply it immediately to eliminate the vulnerable strcpy implementation.
  • In the absence of a patch, restrict or disable external access to the /goform/ConfigExceptAli endpoint, or enforce strict input length validation to prevent oversized payloads from reaching the vulnerable code.

Generated by OpenCVE AI on April 18, 2026 at 05:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Utt 520w Firmware
CPEs cpe:2.3:h:utt:520w:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:520w_firmware:*:*:*:*:*:*:*:*
Vendors & Products Utt 520w Firmware

Tue, 20 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt 520w
Vendors & Products Utt
Utt 520w

Mon, 19 Jan 2026 05:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in UTT 进取 520W 1.7.7-180627. This issue affects the function strcpy of the file /goform/ConfigExceptAli. The manipulation results in buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title UTT 进取 520W ConfigExceptAli strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:42:31.569Z

Reserved: 2026-01-18T07:29:57.238Z

Link: CVE-2026-1140

cve-icon Vulnrichment

Updated: 2026-01-20T21:26:17.841Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T06:16:01.640

Modified: 2026-02-04T20:42:33.760

Link: CVE-2026-1140

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses