Impact
A buffer overflow exists in the timeRangeName parameter of the formConfigDnsFilterGlobal function in the UTT Aggressive HiPER 1200GW firmware. The overflow allows malicious input to corrupt the program’s memory and crash the service, resulting in a denial of service of the device or network function. The weakness is a classic buffer overflow that can be triggered by crafting oversized or specially structured input values.
Affected Systems
The vulnerability affects UTT Aggressive HiPER 1200GW model version v2.5.3‑170306. Devices running this firmware version are susceptible to the overflow via the timeRangeName field of the DNS filter configuration form.
Risk and Exploitability
The CVSS score is not provided, and no EPSS value or KEV listing is available. Nevertheless, the vulnerability permits remote exploitation by supplying an oversized timeRangeName string, likely over the device’s web or API interface. Successful exploitation results in a service crash and loss of availability. Given that the flaw is a clear buffer overflow, the potential impact is high for systems where uptime is critical. Attacks would require network access to the device’s management interface and the ability to send crafted configuration requests.
OpenCVE Enrichment