Impact
A buffer overflow vulnerability exists in the strcpy function used by the /goform/ConfigExceptMSN interface of the UTT HiPER 810G. The flaw arises when the remark argument is manipulated, allowing an attacker to exceed the buffer limits. This flaw corresponds to CWE‑119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE‑120 (Read/Write Buffer Overflows). If successfully exploited, an attacker can overwrite critical memory structures, potentially leading to arbitrary code execution or denial of service on the affected device.
Affected Systems
The vulnerability affects the UTT HiPER 810G up to firmware version 1.7.7‑171114. Software running on versions earlier than 1.7.8 is susceptible. This includes the specified firmware build and any downstream devices that use the same version or earlier revisions.
Risk and Exploitability
The CVSS score of 8.6 indicates high severity. Although the EPSS score is reported as less than 1%, a publicly available exploit has been disclosed, increasing practical risk. The vulnerability is not listed in CISA’s KEV catalog. Remote exploitation requires networking capabilities to the device and the ability to craft a remark payload. Successful exploitation could grant the attacker administrative control, data exfiltration, or disruption of the device’s intended function.
OpenCVE Enrichment