Description
UTT Aggressive HiPER 810G v3v1.7.7-171114 was discovered to contain a buffer overflow in the selDateType parameter of the formTaskEdit function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
Published: 2026-04-06
Score: 4.5 Medium
EPSS: n/a
KEV: No
Impact: Denial of Service via buffer overflow in formTaskEdit
Action: Apply Patch
AI Analysis

Impact

A buffer overflow occurs in the selDateType parameter of the formTaskEdit function within UTT Aggressive HiPER 810G. Sending an input that exceeds the expected buffer size triggers an out‑of‑bounds write, causing the application to crash and resulting in a denial of service. The weakness aligns with classic buffer copy without bounds checking.

Affected Systems

UTT Aggressive HiPER 810G firmware version v3v1.7.7-171114 is the only version listed as affected; no other vendors or product variants are reported.

Risk and Exploitability

The CVSS score is not disclosed and EPSS data is unavailable, so an exact severity rating cannot be assigned. The likely attack vector is that an attacker must be able to send a crafted request to the vulnerable formTaskEdit endpoint, which suggests remote exploitation through network access to that function. No official fix or workaround has been published, leaving the vulnerability exploitable until a corrected firmware release is applied. Because the vulnerability is not present in the CISA KEV catalog, no widespread exploitation has been reported to date.

Generated by OpenCVE AI on April 6, 2026 at 17:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check with UTT for an updated firmware release that removes the overflow and apply it promptly
  • If no fix is available, use network segmentation or firewall rules to limit or deny inbound traffic to the formTaskEdit endpoint
  • Enforce input validation on the selDateType field to reject data exceeding the expected size
  • Enable logging and monitoring to detect application crashes so that remediation can be applied quickly

Generated by OpenCVE AI on April 6, 2026 at 17:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in selDateType Causing DoS in UTT Aggressive HiPER 810G
First Time appeared Utt
Utt hiper 810g
Weaknesses CWE-120
CWE-787
Vendors & Products Utt
Utt hiper 810g
Metrics cvssV3_1

{'score': 4.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description UTT Aggressive HiPER 810G v3v1.7.7-171114 was discovered to contain a buffer overflow in the selDateType parameter of the formTaskEdit function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-06T19:54:45.325Z

Reserved: 2026-03-09T00:00:00.000Z

Link: CVE-2026-31066

cve-icon Vulnrichment

Updated: 2026-04-06T19:54:39.866Z

cve-icon NVD

Status : Received

Published: 2026-04-06T15:17:09.200

Modified: 2026-04-06T20:16:23.217

Link: CVE-2026-31066

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:47:51Z

Weaknesses