Description
A vulnerability has been found in UTT 进取 520W 1.7.7-180627. The affected element is the function strcpy of the file /goform/formPolicyRouteConf. Such manipulation of the argument GroupName leads to buffer overflow. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-06
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow flaw exists in the strcpy operation used to copy the GroupName parameter within the /goform/formPolicyRouteConf endpoint of UTT 进取 520W firmware. The vulnerability breaches the bounds of the buffer, allowing an attacker to write arbitrary data into adjacent memory. Because the overflow can be triggered remotely, an attacker could potentially execute arbitrary code, compromise the device’s control plane, or cause a denial‑of‑service condition. The flaw is categorized as CWE‑119 and CWE‑120 – unchecked buffer copy that overflows the target memory region.

Affected Systems

The firmware version 1.7.7-180627 of the UTT 520W product is impacted. No other version numbers are listed in the reference data.

Risk and Exploitability

The CVSS score of 8.7 rates the vulnerability as high severity, and the EPSS score of less than 1% indicates a low historical exploitation probability. This vulnerability is not listed in CISA’s KEV catalog, but it has been publicly disclosed. The attack vector is inferred to be remote, leveraging the publicly accessible web management interface. Exploit complexity is low, and privileges required are none, meaning an unauthenticated attacker can trigger the overflow.

Generated by OpenCVE AI on April 18, 2026 at 18:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade UTT 520W firmware to a patched version if available; otherwise, install the latest stable firmware release that contains the fixed implementation.
  • Limit exposure by blocking or restricting remote access to the web management interface, applying firewall rules or VLAN segregation to permit only trusted administrators.
  • Configure the network to monitor and alert on anomalous or repeated POST requests to /goform/formPolicyRouteConf, and isolate or block traffic that attempts to exploit the overflow feature.

Generated by OpenCVE AI on April 18, 2026 at 18:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt 520w Firmware
CPEs cpe:2.3:h:utt:520w:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:520w_firmware:1.7.7-180627:*:*:*:*:*:*:*
Vendors & Products Utt 520w Firmware

Tue, 10 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt 520w
Vendors & Products Utt
Utt 520w

Fri, 06 Feb 2026 22:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in UTT 进取 520W 1.7.7-180627. The affected element is the function strcpy of the file /goform/formPolicyRouteConf. Such manipulation of the argument GroupName leads to buffer overflow. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title UTT 进取 520W formPolicyRouteConf strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:28:46.538Z

Reserved: 2026-02-06T07:41:24.091Z

Link: CVE-2026-2070

cve-icon Vulnrichment

Updated: 2026-02-10T15:20:47.239Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T23:15:55.277

Modified: 2026-02-13T18:55:44.693

Link: CVE-2026-2070

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:30:07Z

Weaknesses