Impact
The vulnerability is a stack-based buffer overflow triggered by an overly long "passwd1" argument sent to the /goform/setSysAdm function in UTT HiPER 810G firmware. The use of the unsafe strcpy function in this code path can overwrite adjacent memory, potentially leading to arbitrary code execution. This flaw is numbered CWE-119 (Improper Restriction of Operations within the Bounds of a Buffer) and CWE-120 (Classic Buffer Overflow).
Affected Systems
Device owners of UTT HiPER 810G units running firmware versions up to and including 1.7.7-1711 are affected. The vulnerability exists in the device’s web interface and is manifested through the admin configuration page.
Risk and Exploitability
The CVSS base score of 8.6 classifies this flaw as high severity, and the EPSS score of less than 1% indicates a small current exploitation probability, though the flaw is publicly disclosed and could be used. The vulnerability is not listed in the CISA KEV catalogue. Attack is initiated remotely via an HTTP request to /goform/setSysAdm, so any external network reach to the device could allow exploitation.
OpenCVE Enrichment