Description
A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. This affects the function strcpy of the file /goform/NTP. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.
Published: 2026-03-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via NTP strcpy buffer overflow
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow occurs when the NTP configuration handler employs an unsafe strcpy call, allowing an attacker to write arbitrary data into memory. The vulnerability can be triggered remotely and is publicly available for exploitation. It provides an attacker the ability to corrupt internal state or execute arbitrary code, potentially compromising confidentiality, integrity, or availability of the affected device.

Affected Systems

The flaw affects UTT HiPER 810G devices running firmware versions up to 1.7.7-171114. Documentation does not specify whether all hardware revisions are impacted; only firmware version is known. Devices with newer firmware releases that have replaced the unsafe strcpy routine are not impacted.

Risk and Exploitability

The vulnerability carries a high CVSS score of 8.7 and an EPSS probability of less than 1 %, indicating that while exploitation is possible, it is considered unlikely at the current moment. The issue is not listed in the CISA KEV catalog, but the public availability of an exploit and the remote attack vector suggest that motivated threat actors could target the device if left unpatched. Attacks would likely involve sending a crafted NTP configuration packet to the /goform/NTP endpoint, triggering memory corruption and arbitrary code execution.

Generated by OpenCVE AI on April 17, 2026 at 12:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest UTT HiPER 810G firmware that removes the unsafe strcpy usage.
  • If an immediate upgrade is not feasible, restrict external access to the /goform/NTP endpoint using firewall or network ACL rules to prevent remote interaction.
  • Consider temporarily disabling NTP services or isolating the device from untrusted networks until the firmware update is applied.
  • Implement logging and monitoring for anomalous NTP configuration traffic to detect potential exploitation attempts.

Generated by OpenCVE AI on April 17, 2026 at 12:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Utt 810g
Utt 810g Firmware
CPEs cpe:2.3:h:utt:810g:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:810g_firmware:*:*:*:*:*:*:*:*
Vendors & Products Utt 810g
Utt 810g Firmware

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt hiper 810g
Vendors & Products Utt
Utt hiper 810g

Sun, 08 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. This affects the function strcpy of the file /goform/NTP. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.
Title UTT HiPER 810G NTP strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Utt 810g 810g Firmware Hiper 810g
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T13:47:11.909Z

Reserved: 2026-03-07T08:46:46.829Z

Link: CVE-2026-3698

cve-icon Vulnrichment

Updated: 2026-03-10T13:47:06.754Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T02:16:00.980

Modified: 2026-03-10T15:21:52.560

Link: CVE-2026-3698

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:15:18Z

Weaknesses