Description
UTT Aggressive 520W v3v1.7.7-180627 was discovered to contain a buffer overflow in the filename parameter of the formFtpServerDirConfig function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
Published: 2026-04-06
Score: 4.5 Medium
EPSS: n/a
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow exists in the filename parameter of the formFtpServerDirConfig function within UTT Aggressive 520W firmware v3v1.7.7-180627. By sending a specially crafted filename through the FTP service, an attacker can corrupt memory and force the service to crash, resulting in a denial‑of‑service condition.

Affected Systems

The vulnerability affects only UTT Aggressive 520W routers running firmware v3v1.7.7-180627. No other vendors or product variations are reported to be impacted.

Risk and Exploitability

Specific CVSS or EPSS scores are not provided, and the vulnerability does not appear in any known exploited vulnerability catalog. The attack can be launched remotely by an attacker who can reach the device’s FTP port. While it does not provide further system compromise, it can disrupt network operations by causing the FTP service to stop, which may be significant in environments where the router is exposed to untrusted networks.

Generated by OpenCVE AI on April 6, 2026 at 17:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a firmware update that addresses the buffer overflow.
  • If a patch is unavailable, disable the FTP service on the device to remove the attack surface.
  • Implement monitoring to detect abnormal FTP activity and repeated crashes in system logs.
  • Use network segmentation or firewall rules to restrict the FTP port to trusted hosts only.

Generated by OpenCVE AI on April 6, 2026 at 17:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Title UTT Aggressive 520W Firmware Buffer Overflow in FTP Configuration Causes DoS
First Time appeared Utt
Utt 520w
Weaknesses CWE-119
CWE-120
Vendors & Products Utt
Utt 520w
Metrics cvssV3_1

{'score': 4.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description UTT Aggressive 520W v3v1.7.7-180627 was discovered to contain a buffer overflow in the filename parameter of the formFtpServerDirConfig function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-06T19:51:52.375Z

Reserved: 2026-03-09T00:00:00.000Z

Link: CVE-2026-31062

cve-icon Vulnrichment

Updated: 2026-04-06T19:51:32.877Z

cve-icon NVD

Status : Received

Published: 2026-04-06T15:17:08.840

Modified: 2026-04-06T20:16:22.720

Link: CVE-2026-31062

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:47:55Z

Weaknesses