Impact
The vulnerability exists in the strcpy function used by the /goform/formPolicyRouteConf handler in UTT HiPER 810G firmware versions up to 1.7.7‑171114. A specially crafted GroupName value can overflow the destination buffer, provoking memory corruption. The CVE description does not explicitly state the extent of the impact beyond the overflow, so the concrete consequences such as code execution are not confirmed in the publicly released data.
Affected Systems
This issue affects UTT HiPER 810G routers and appliances running firmware 1.7.7 or earlier.
Risk and Exploitability
The CVSS score of 8.7 classifies the flaw as high severity. EPSS indicates a very low chance of exploitation (< 1 %) at the time of this analysis, and the vulnerability has not yet appeared in the CISA KEV list. Nevertheless, remote attackers can trigger the overflow by sending a malicious request to the vulnerable endpoint, as public proof‑of‑concept code demonstrates. Because the exploit is remote and does not require local privileges, the risk can affect any subnet or network segment that can reach the device.
OpenCVE Enrichment