Impact
A remote command injection vulnerability exists in the UTT HiPER 810 firmware. The flaw is located in the rehttpd component’s /goform/formReleaseConnect endpoint, where an attacker can manipulate the Isp_Name argument to inject arbitrary shell commands. This flaw reflects improper input validation and is categorized as CWE-74 and CWE-77. The vulnerability permits an attacker to execute arbitrary code, potentially compromising confidentiality, integrity, and availability of the affected device.
Affected Systems
UTT HiPER 810 devices running firmware version 1.7.4-141218 are affected. The vulnerability is tied specifically to the sub_4407D4 function within the rehttpd component of that firmware release.
Risk and Exploitability
The CVSS score of 8.6 indicates high severity, while an EPSS score of less than 1% suggests a low but nonzero likelihood of exploitation. The absence from the CISA KEV list means it has not yet been identified as a widely exploited vulnerability, yet the public disclosure and published exploit code demonstrate that remote attackers can readily target the flaw. Exploitation requires remote network access and can be achieved by sending a crafted HTTP request to /goform/formReleaseConnect with an injected Isp_Name payload.
OpenCVE Enrichment