Description
A vulnerability was determined in UTT HiPER 810 1.7.4-141218. The impacted element is the function sub_4407D4 of the file /goform/formReleaseConnect of the component rehttpd. Executing a manipulation of the argument Isp_Name can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-02-08
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Injection
Action: Immediate Patch
AI Analysis

Impact

A remote command injection vulnerability exists in the UTT HiPER 810 firmware. The flaw is located in the rehttpd component’s /goform/formReleaseConnect endpoint, where an attacker can manipulate the Isp_Name argument to inject arbitrary shell commands. This flaw reflects improper input validation and is categorized as CWE-74 and CWE-77. The vulnerability permits an attacker to execute arbitrary code, potentially compromising confidentiality, integrity, and availability of the affected device.

Affected Systems

UTT HiPER 810 devices running firmware version 1.7.4-141218 are affected. The vulnerability is tied specifically to the sub_4407D4 function within the rehttpd component of that firmware release.

Risk and Exploitability

The CVSS score of 8.6 indicates high severity, while an EPSS score of less than 1% suggests a low but nonzero likelihood of exploitation. The absence from the CISA KEV list means it has not yet been identified as a widely exploited vulnerability, yet the public disclosure and published exploit code demonstrate that remote attackers can readily target the flaw. Exploitation requires remote network access and can be achieved by sending a crafted HTTP request to /goform/formReleaseConnect with an injected Isp_Name payload.

Generated by OpenCVE AI on April 17, 2026 at 22:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the HiPER 810 firmware to the latest version that contains a patch for the /goform/formReleaseConnect command injection flaw.
  • If an upgrade is unavailable, restrict network access to the rehttpd service or the /goform/formReleaseConnect endpoint so that only trusted hosts can reach the vulnerable interface.
  • Implement input validation or sanitation on the Isp_Name parameter, ensuring that shell metacharacters are escaped or rejected, to prevent command injection.

Generated by OpenCVE AI on April 17, 2026 at 22:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt 810
Utt 810 Firmware
CPEs cpe:2.3:h:utt:810:4.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:810_firmware:1.7.4-141218:*:*:*:*:*:*:*
Vendors & Products Utt 810
Utt 810 Firmware

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt hiper 810
Vendors & Products Utt
Utt hiper 810

Sun, 08 Feb 2026 00:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in UTT HiPER 810 1.7.4-141218. The impacted element is the function sub_4407D4 of the file /goform/formReleaseConnect of the component rehttpd. Executing a manipulation of the argument Isp_Name can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Title UTT HiPER 810 rehttpd formReleaseConnect sub_4407D4 command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:35:59.363Z

Reserved: 2026-02-06T14:44:52.536Z

Link: CVE-2026-2118

cve-icon Vulnrichment

Updated: 2026-02-10T19:24:24.002Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T01:16:09.070

Modified: 2026-02-13T18:46:55.260

Link: CVE-2026-2118

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:15:29Z

Weaknesses