Description
A vulnerability has been found in UTT HiPER 810 1.7.4-141218. This issue affects the function setSysAdm of the file /goform/formUser. The manipulation of the argument passwd1 leads to command injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-07
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Assess Impact
AI Analysis

Impact

Manipulation of the passwd1 argument in the setSysAdm function of the UTT HiPER 810 firmware enables remote command injection. By sending a crafted /goform/formUser request, an attacker can execute arbitrary shell commands with the privileges of the device. This leads to full compromise of confidentiality, integrity, and availability of the system, as the affected firmware runs with root‑level privileges and has access to network and management resources. The weakness is a classic command injection flaw (CWE‑74) exacerbated by a lack of input sanitization (CWE‑77).

Affected Systems

The vulnerability affects UTT HiPER 810 devices running firmware 1.7.4‑141218 and the associated GoForm format 4.0. Devices with identical model and firmware revision are susceptible. No other hardware or firmware versions are listed as impacted.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity. The EPSS score of less than 1 % denotes a very low probability of exploitation in the wild, likely due to the need for remote access to a specific internal endpoint. The vulnerability is not listed in the CISA KEV catalog. Exploitation would require network connectivity to the device’s management interface; an attacker who can reach the /goform/formUser URI can inject payloads into the passwd1 field and trigger remote command execution. The attack surface is limited to devices with the vulnerable firmware and publicly exposed management endpoints.

Generated by OpenCVE AI on April 17, 2026 at 22:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Identify all UTT HiPER 810 devices in use and verify they are running firmware 1.7.4‑141218 or earlier.
  • Block external network access to the /goform/formUser endpoint or the device’s administrative interface using firewall or network segmentation rules.
  • Apply a vendor‑supplied firmware update when it becomes available; if no update is released, enforce strict network isolation and consider disabling remote administration entirely until a fix is issued.

Generated by OpenCVE AI on April 17, 2026 at 22:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt 810
Utt 810 Firmware
CPEs cpe:2.3:h:utt:810:4.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:810_firmware:1.7.4-141218:*:*:*:*:*:*:*
Vendors & Products Utt 810
Utt 810 Firmware

Tue, 10 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt hiper 810
Vendors & Products Utt
Utt hiper 810

Sat, 07 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in UTT HiPER 810 1.7.4-141218. This issue affects the function setSysAdm of the file /goform/formUser. The manipulation of the argument passwd1 leads to command injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title UTT HiPER 810 formUser setSysAdm command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:30:46.455Z

Reserved: 2026-02-06T08:00:39.436Z

Link: CVE-2026-2080

cve-icon Vulnrichment

Updated: 2026-02-10T15:38:56.448Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-07T09:16:01.593

Modified: 2026-02-13T18:49:08.830

Link: CVE-2026-2080

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:15:29Z

Weaknesses