Description
A vulnerability was detected in UTT HiPER 810G up to 1.7.7-171114. Affected by this vulnerability is the function strcpy of the file /goform/formFireWall of the component Management Interface. The manipulation of the argument GroupName results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-07
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow exists in the strcpy implementation within the /goform/formFireWall component of the HiPER 810G management interface. Manipulation of the GroupName argument can overflow the destination buffer, potentially allowing remote code execution or privilege escalation. The weakness is categorized as CWE‑119 and CWE‑120, indicating uncontrolled memory access due to improper bounds checking.

Affected Systems

The vulnerability affects UTT’s HiPER 810G hardware running firmware versions up to 1.7.7‑171114. Users deploying any firmware in that range are at risk. No subsequent versions are listed in the current data.

Risk and Exploitability

The CVSS base score of 8.7 classifies the flaw as high severity, while the EPSS score of less than 1% indicates low current exploitation probability. However, the exploit is public and can be launched remotely, and the vulnerability is not yet listed in CISA’s KEV catalog. Attackers can target any externally reachable device that exposes the management interface, making the risk significant if the interface is left exposed.

Generated by OpenCVE AI on April 18, 2026 at 13:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the HiPER 810G firmware to a version that includes the fix for the /goform/formFireWall strcpy buffer overflow.
  • Restrict access to the device’s management interface by implementing firewall rules or disabling remote management when not needed.
  • Apply network segmentation or VPN access controls so only trusted networks can reach the management interface.
  • Periodically monitor logs for anomalous connection attempts to the /goform/formFireWall endpoint and investigate any suspicious activity.

Generated by OpenCVE AI on April 18, 2026 at 13:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Utt 810g
Utt 810g Firmware
CPEs cpe:2.3:h:utt:810g:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:810g_firmware:*:*:*:*:*:*:*:*
Vendors & Products Utt 810g
Utt 810g Firmware

Tue, 10 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt hiper 810g
Vendors & Products Utt
Utt hiper 810g

Sat, 07 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in UTT HiPER 810G up to 1.7.7-171114. Affected by this vulnerability is the function strcpy of the file /goform/formFireWall of the component Management Interface. The manipulation of the argument GroupName results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title UTT HiPER 810G Management formFireWall strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Utt 810g 810g Firmware Hiper 810g
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:32:13.444Z

Reserved: 2026-02-06T08:22:33.810Z

Link: CVE-2026-2086

cve-icon Vulnrichment

Updated: 2026-02-10T15:47:02.238Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-07T14:16:08.047

Modified: 2026-02-24T20:05:16.443

Link: CVE-2026-2086

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:30:45Z

Weaknesses