Impact
A buffer overflow exists in the selDateType parameter of the formTaskEdit function within UTT Aggressive HiPER 810G v3 firmware. This flaw allows an attacker to supply specially crafted data that causes the application to crash, leading to a restart of the system and a temporary denial of service. The weakness is a classic CWE‑120 type buffer overflow. The vulnerability is limited to non‑remote execution; the attacker must be able to reach the formTaskEdit entry point, which is typically exposed through the device’s web interface or management protocol. Based on the description, it is inferred that an attacker can trigger the overflow by submitting a request to the editing form with an oversized selDateType field.
Affected Systems
The affected products are UTT Aggressive HiPER 810G devices running firmware version 3.0, specifically the build v1.7.7‑171114. Devices of this model include the 810G series running the 810g firmware. No other provider or version is listed as affected.
Risk and Exploitability
The CVSS score of 4.5 indicates a moderate severity. The EPSS score of less than 1% suggests a very low probability of exploitation in the wild, and the vulnerability is not present in the CISA Known Exploited Vulnerabilities catalog. The attack surface appears to be a web‑based interface that can be accessed over the network, implying remote exploitation is possible if credentials or local access is provided. No publicly available exploit code is reported, and the flaw requires the attacker to control the input to the formTaskEdit function.
OpenCVE Enrichment