Impact
A buffer overflow in the addCommand parameter of the formConfigCliForEngineerOnly function within UTT Aggressive 520W firmware can be triggered by a crafted input. The overflow corrupts the execution stack, causing the device to crash and stop responding. This results in a loss of availability and no direct impact on confidentiality or privilege escalation.
Affected Systems
Systems running the UTT Aggressive 520W v3 or later that use firmware version 1.7.7‑180627 are affected. The vulnerability is limited to the engineer‑only command‑line interface; other user interfaces are unaffected.
Risk and Exploitability
The CVSS score of 4.5 indicates moderate severity. The EPSS score below 1 % suggests exploitation is unlikely in the wild. Based on the description, it is inferred that the likely attack vector requires local or privileged access to the engineer‑only CLI, which may be exposed through the device’s network management or console ports. The vulnerability is not listed in the KEV catalog, so no confirmed public exploits are known.
OpenCVE Enrichment