Description
A weakness has been identified in UTT 进取 520W 1.7.7-180627. This affects the function strcpy of the file /goform/formIpGroupConfig. Executing a manipulation of the argument groupName can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-06
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution (inferred)
Action: Apply Patch
AI Analysis

Impact

A buffer overflow flaw exists in the UTT 进取 520W firmware 1.7.7-180627 due to an unchecked strcpy call in the /goform/formIpGroupConfig endpoint when processing the groupName argument. The overflow can corrupt adjacent memory, and based on the nature of the flaw it is inferred that this could enable remote code execution, though this exact impact is not explicitly stated in the CVE description. The vulnerability permits an attacker to craft a groupName longer than the allocated buffer, triggering the overflow.

Affected Systems

The only impacted devices are UTT 进取 520W routers running firmware version 1.7.7-180627, with the vulnerable code exposed through the web‑interface endpoint /goform/formIpGroupConfig. No other products or firmware revisions are listed as affected.

Risk and Exploitability

The flaw receives a CVSS score of 8.7, indicating high severity. EPSS is below 1%, and the issue is not in the CISA KEV catalog, yet a publicly available exploit exists and can be launched from any location that can reach the device’s management interface. Because the vendor did not respond to the disclosure, the risk remains elevated until the flaw is remediated.

Generated by OpenCVE AI on April 18, 2026 at 18:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Acquire and install the latest firmware release from UTT that addresses the buffer‑overflow defect.
  • If a firmware update is not immediately available, isolate the device by allowing only trusted IP ranges to reach the web‑interface, or place the unit behind a firewall that blocks external management traffic.
  • If the firmware’s web interface allows configuration, disable or block the /goform/formIpGroupConfig endpoint to prevent external exploitation.

Generated by OpenCVE AI on April 18, 2026 at 18:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Utt 520w Firmware
CPEs cpe:2.3:h:utt:520w:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:520w_firmware:1.7.7-180627:*:*:*:*:*:*:*
Vendors & Products Utt 520w Firmware

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt 520w
Vendors & Products Utt
Utt 520w

Fri, 06 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in UTT 进取 520W 1.7.7-180627. This affects the function strcpy of the file /goform/formIpGroupConfig. Executing a manipulation of the argument groupName can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title UTT 进取 520W formIpGroupConfig strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:27:53.769Z

Reserved: 2026-02-06T06:59:29.800Z

Link: CVE-2026-2066

cve-icon Vulnrichment

Updated: 2026-02-06T20:39:56.961Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T21:16:19.733

Modified: 2026-02-10T15:11:28.863

Link: CVE-2026-2066

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:30:07Z

Weaknesses