Impact
The vulnerability exists in UTT HiPER 810G firmware versions up to 1.7.7‑171114 in the strcpy routine that processes the /goform/formP2PLimitConfig request. An attacker can send a specially crafted string that overflows the buffer, leading to arbitrary code execution in the device’s firmware. The flaw is a classic stack-based buffer overflow (CWE‑119/CWE‑120).
Affected Systems
Systems running UTT HiPER 810G firmware up to version 1.7.7‑171114 are susceptible. The affected component resides at cpe:2.3:h:utt:810g:3.0:* and the firmware CPE cpe:2.3:o:utt:810g_firmware:*.
Risk and Exploitability
With a CVSS base score of 8.7 the vulnerability is classified as high. EPSS indicates a low exploitation probability (< 1 %), yet a publicly available exploit has been published, implying that the attack can be launched remotely via the web interface. The weakness allows remote attackers to overwrite memory and execute arbitrary code, and it is not currently listed in the CISA KEV catalog.
OpenCVE Enrichment