Impact
The flaw lies in sub_44EFB4 within the Web Management Interface and allows attackers to manipulate the Isp_Name input to execute arbitrary operating‑system commands through the /goform/formReleaseConnect endpoint. This is an OS command injection flaw that can be triggered remotely, potentially compromising the device’s confidentiality, integrity, and availability.
Affected Systems
The vulnerability affects UTT HiPER 520, specifically firmware version 1.7.7‑160105. No other versions are listed as impacted.
Risk and Exploitability
The CVSS score of 8.6 indicates a high severity. The EPSS score of less than 1% suggests that the likelihood of exploitation is low, and the vulnerability is not currently listed in the CISA KEV catalog. The attack vector is remote via the web interface, requiring network access to the device's management port. Because the exploit is publicly available, the risk persists until the device is patched or mitigated.
OpenCVE Enrichment