Description
A vulnerability was determined in UTT HiPER 810G 1.7.7-171114. This affects the function strcpy of the file /goform/ConfigExceptAli. Executing a manipulation can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-02-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unsafe strcpy buffer overflow in ConfigExceptAli endpoint
Action: Apply Patch
AI Analysis

Impact

The flaw is a classic buffer overflow caused by the use of an unsafe strcpy function in the /goform/ConfigExceptAli interface of the UTT HiPER 810G firmware. The copying operation can overwrite adjacent memory, potentially corrupting internal data structures. The CVE description does not assert arbitrary code execution; however, such overflows can lead to undefined behavior, including possible crashes, data loss, or other forms of memory corruption that could impact device availability and the integrity of its configuration.

Affected Systems

The vulnerability is documented for UTT HiPER 810G firmware version 1.7.7‑171114. No other firmware versions are listed as affected in the available information.

Risk and Exploitability

The CVSS score of 8.7 signals a high severity risk. The EPSS score is less than 1%, indicating a very low probability of exploitation at present. The issue is not included in CISA's KEV catalog. The description states that the attack can be launched remotely, likely through the device's web management interface at /goform/ConfigExceptAli. An attacker would need network connectivity to the device, and the vulnerability may be exploitable with or without authentication, depending on the interface’s protection mechanisms.

Generated by OpenCVE AI on April 18, 2026 at 11:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest UTT HiPER 810G firmware that fixes the unsafe strcpy usage in the ConfigExceptAli endpoint.
  • If a firmware update is unavailable, block or disable external access to the device’s web interface, particularly the /goform/ConfigExceptAli endpoint, to limit remote exploitation.
  • Place the device within a segregated network segment and apply firewall rules that restrict traffic to trusted hosts only.
  • Monitor device logs for unexpected activity related to the ConfigExceptAli interface and review for signs of potential exploitation attempts.

Generated by OpenCVE AI on April 18, 2026 at 11:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt 810g
Utt 810g Firmware
CPEs cpe:2.3:h:utt:810g:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:810g_firmware:*:*:*:*:*:*:*:*
Vendors & Products Utt 810g
Utt 810g Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt hiper 810g
Vendors & Products Utt
Utt hiper 810g

Sun, 22 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in UTT HiPER 810G 1.7.7-171114. This affects the function strcpy of the file /goform/ConfigExceptAli. Executing a manipulation can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Title UTT HiPER 810G ConfigExceptAli strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Utt 810g 810g Firmware Hiper 810g
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-26T16:21:49.621Z

Reserved: 2026-02-20T20:08:08.431Z

Link: CVE-2026-2904

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-22T01:16:00.797

Modified: 2026-02-24T17:49:09.663

Link: CVE-2026-2904

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:15:35Z

Weaknesses