Impact
A buffer overflow occurs when the NTP configuration handler employs an unsafe strcpy call, allowing an attacker to write arbitrary data into memory. The vulnerability can be triggered remotely and is publicly available for exploitation. It provides an attacker the ability to corrupt internal state or execute arbitrary code, potentially compromising confidentiality, integrity, or availability of the affected device.
Affected Systems
The flaw affects UTT HiPER 810G devices running firmware versions up to 1.7.7-171114. Documentation does not specify whether all hardware revisions are impacted; only firmware version is known. Devices with newer firmware releases that have replaced the unsafe strcpy routine are not impacted.
Risk and Exploitability
The vulnerability carries a high CVSS score of 8.7 and an EPSS probability of less than 1 %, indicating that while exploitation is possible, it is considered unlikely at the current moment. The issue is not listed in the CISA KEV catalog, but the public availability of an exploit and the remote attack vector suggest that motivated threat actors could target the device if left unpatched. Attacks would likely involve sending a crafted NTP configuration packet to the /goform/NTP endpoint, triggering memory corruption and arbitrary code execution.
OpenCVE Enrichment