Description
A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/formTimeGroupConfig. The manipulation of the argument year1 leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-06
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via buffer overflow
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is located in the strcpy routine used within the /goform/formTimeGroupConfig handler on UTT 进取 520W. An attacker can cause a stack buffer overflow by supplying a year1 argument larger than the allocated buffer. This overrun could overwrite return addresses or other control data, giving the attacker the potential to execute arbitrary code on the device. Because the overflow is directly exploitable, the primary consequence is remote code execution, thereby compromising device confidentiality, integrity, and availability. This flaw is a classic stack buffer overflow (CWE-119, CWE-120).

Affected Systems

The flaw affects UTT 进取 520W firmware version 1.7.7-180627. No other affected product or version information is publicly available.

Risk and Exploitability

The CVSS score of 8.7 signals a high severity risk. The EPSS score of less than 1% indicates a currently low probability of exploitation in the wild, though an exploit has already been disclosed publicly. The description states the attack may be initiated remotely; based on the file path and context, it is inferred that the attack vector is through the device's web interface using HTTP requests. Since the vulnerability occurs without the need for authentication, any network-facing device that exposes the interface to untrusted hosts could be vulnerable. The vulnerability is not included in CISA's KEV catalog, but the lack of a vendor patch or workaround increases the exposure risk.

Generated by OpenCVE AI on April 18, 2026 at 18:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any firmware update released by the vendor that addresses the strcpy buffer overflow in /goform/formTimeGroupConfig.
  • Restrict network access to the web management interface, allowing connections only from trusted IP ranges or by placing the device behind a firewall or VPN.
  • Enforce input validation to limit the length of the year1 parameter or otherwise sanitize data received by /goform/formTimeGroupConfig.
  • If the /goform/formTimeGroupConfig endpoint is unnecessary for the device’s operation, disable or block access to that endpoint.

Generated by OpenCVE AI on April 18, 2026 at 18:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Utt 520w Firmware
CPEs cpe:2.3:h:utt:520w:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:520w_firmware:1.7.7-180627:*:*:*:*:*:*:*
Vendors & Products Utt 520w Firmware

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt 520w
Vendors & Products Utt
Utt 520w

Fri, 06 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/formTimeGroupConfig. The manipulation of the argument year1 leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title UTT 进取 520W formTimeGroupConfig strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:28:07.349Z

Reserved: 2026-02-06T06:59:33.824Z

Link: CVE-2026-2067

cve-icon Vulnrichment

Updated: 2026-02-12T15:01:34.265Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T21:16:19.917

Modified: 2026-02-10T15:11:17.870

Link: CVE-2026-2067

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:30:07Z

Weaknesses