Impact
A vulnerability was identified in UTT Aggressive 520W firmware version v3v1.7.7-180627. The flaw is a classic buffer overflow located in the addCommand parameter of the formConfigCliForEngineerOnly function. Exploiting this overflow allows an attacker to send a crafted input that corrupts memory and causes the device to crash, resulting in a Denial of Service. Because the crash terminates the CLI session, the device cannot process legitimate configuration changes until it is manually rebooted.
Affected Systems
This issue affects the UTT Aggressive 520W series running firmware v3v1.7.7-180627. No vendor name was identified in the CVE data, but the product model and firmware revision are explicitly listed in the description. Devices operating under this configuration are the only ones at risk; earlier firmware releases or other UTT models are not mentioned.
Risk and Exploitability
The CVSS assessment is not provided, but the presence of a buffer overflow suggests a high impact score. EPSS data is unavailable, and the vulnerability is not currently in the CISA KEV catalog. Because the addCommand interface is part of a CLI intended for engineers, we infer that the attack vector could be remote if the CLI is exposed over the network, or local if an attacker gains console access. No exploit code has been published, so the exploitability likely depends on the attacker’s ability to interact with the CLI. Nevertheless, a successful exploitation results in total loss of service until the device is restarted or patched.
OpenCVE Enrichment