Impact
The vulnerability arises from an improper use of the C function strcpy in the formSyslogConf endpoint of the UTT 进取 520W firmware, allowing an attacker to supply a ServerIp argument that exceeds the allocated buffer. This buffer overflow can overwrite adjacent memory, potentially leading to arbitrary code execution or a crash. The weakness is identified as an out‑of‑bounds write (CWE‑119) and a buffer overflow vulnerability (CWE‑120).
Affected Systems
The affected product is the UTT 进取 520W router, specifically firmware version 1.7.7‑180627. No other firmware releases are listed as impacted.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity. The EPSS score is low (< 1%), suggesting limited current exploitation probability, but the vulnerability is publicly documented and vendor response is lacking. An attacker can exploit the flaw remotely by sending a crafted request to the /goform/formSyslogConf interface, potentially gaining arbitrary code execution on the device. The vulnerability is not yet listed in CISA’s KEV catalog, but the public exploit could be of interest to adversaries targeting network infrastructure.
OpenCVE Enrichment