Impact
A remote attacker can supply specially crafted input to the policyNames argument of the formPdbUpConfig interface, causing arbitrary operating system commands to be executed on the UTT HiPER 520 device. This flaw allows execution of arbitrary code with the privileges of the web management process, compromising confidentiality, integrity and availability of the device and any connected networks.
Affected Systems
The vulnerability exists in the UTT HiPER 520 model running firmware 1.7.7-160105. Only this firmware revision is explicitly documented as affected. Users of earlier or newer firmware versions are not confirmed to be impacted.
Risk and Exploitability
The CVSS score of 8.6 classifies this as high severity, and the EPSS score of less than 1% indicates a low probability of spontaneous exploitation in the wild, though an attacker could still target the device intentionally. The vulnerability is not listed in the CISA KEV catalog, but has been publicly disclosed and may be used. The likely attack vector is remote exploitation via the web interface, with the policyNames parameter acting as the injection point. No prerequisite authentication is mentioned, implying the flaw may be exploitable by unauthenticated users who can reach the web management interface.
OpenCVE Enrichment