Description
A remote command execution (RCE) vulnerability in the /goform/formReleaseConnect component of UTT Aggressive 520W v3v1.7.7-180627 allows attackers to execute arbitrary commands via a crafted string.
Published: 2026-04-06
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

A flaw in the /goform/formReleaseConnect component of UTT Aggressive 520W firmware 1.7.7‑180627 permits an attacker to inject a specially crafted string that is executed as a system command on the device. This command injection vulnerability (CWE‑78) can lead to full compromise of the router, allowing the attacker to run arbitrary code, extract sensitive information, or disrupt network services. The impact is a loss of confidentiality, integrity, and availability for any network that relies on the affected router.

Affected Systems

Devices running the UTT Aggressive 520W model with hardware revision 3.0 and firmware version 1.7.7‑180627 are impacted. The CPE identifiers confirm the specific router model and firmware build that contain the flaw.

Risk and Exploitability

The CVSS base score of 6.8 indicates a moderate to high severity. The EPSS score is below 1 %, suggesting that exploitation in the wild is currently unlikely. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker must be able to send an HTTP request to the /goform/formReleaseConnect URL; however the requirement for authentication is not stated in the data, so it remains uncertain whether credentials are needed to reach the vulnerable endpoint. Because no explicit authentication requirement is mentioned, practitioners should assume the possibility of unauthenticated access and test accordingly.

Generated by OpenCVE AI on April 7, 2026 at 22:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from the vendor to all UTT Aggressive 520W routers running firmware 1.7.7‑180627.
  • If a firmware update is not available, block external access to the /goform/formReleaseConnect URL using firewall rules or router ACLs to prevent remote exploitation.
  • Disable remote management or HTTP interface features that expose this endpoint if they are not required for operation.
  • Monitor device logs for unexpected HTTP requests targeting the vulnerable endpoint and investigate any anomalies promptly.

Generated by OpenCVE AI on April 7, 2026 at 22:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Utt 520w Firmware
CPEs cpe:2.3:h:utt:520w:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:520w_firmware:1.7.7-180627:*:*:*:*:*:*:*
Vendors & Products Utt 520w Firmware

Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Title Remote Command Execution via formReleaseConnect in UTT Aggressive 520W
Weaknesses CWE-20

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Title Remote Command Execution via formReleaseConnect in UTT Aggressive 520W
First Time appeared Utt
Utt 520w
Weaknesses CWE-20
CWE-78
Vendors & Products Utt
Utt 520w
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description A remote command execution (RCE) vulnerability in the /goform/formReleaseConnect component of UTT Aggressive 520W v3v1.7.7-180627 allows attackers to execute arbitrary commands via a crafted string.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-06T19:56:28.177Z

Reserved: 2026-03-09T00:00:00.000Z

Link: CVE-2026-31067

cve-icon Vulnrichment

Updated: 2026-04-06T19:56:10.854Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T15:17:09.313

Modified: 2026-04-07T20:22:55.050

Link: CVE-2026-31067

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:52:57Z

Weaknesses