Description
A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-171114. This impacts the function strcpy of the file /goform/formRemoteControl. The manipulation results in buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-03-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow with potential for code execution
Action: Apply Patch
AI Analysis

Impact

A security flaw was identified in the UTT HiPER 810G firmware, affecting the /goform/formRemoteControl endpoint up to version 1.7.7‑171114. The bug stems from an unsafe use of the C library function strcpy, which can overflow a buffer when a payload longer than the allocated space is received. The endpoint is reachable over the network, so the attack vector is remote. The description does not explicitly state that arbitrary code execution is achieved; however, as a buffer overflow it potentially allows the attacker to alter the device’s execution flow.

Affected Systems

The vulnerability exists on UTT HiPER 810G devices running firmware 1.7.7‑171114 or earlier, specifically on builds that include the legacy strcpy implementation within the /goform/formRemoteControl module.

Risk and Exploitability

The CVSS base score of 8.7 signals high severity, while an EPSS figure below 1 % indicates a low but non‑zero probability of exploitation in the wild. The flaw is not listed in the CISA KEV catalog, but publicly available exploit code raises concern. Exploitation requires sending a crafted HTTP request to the vulnerable endpoint without authentication. While the description does not confirm the exact impact, the overflow could plausibly lead to arbitrary code execution, which would compromise confidentiality, integrity, and availability of the device.

Generated by OpenCVE AI on April 17, 2026 at 12:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the HiPER 810G firmware to a release newer than 1.7.7‑171114 that contains the vendor‑issued fix.
  • If a patch is not immediately available, block inbound traffic to the /goform/formRemoteControl endpoint or disable remote control features in the device’s configuration to prevent exploitation.
  • Continuously monitor network traffic and system logs for abnormal requests to the formRemoteControl endpoint, ensuring that access restrictions remain enforced.

Generated by OpenCVE AI on April 17, 2026 at 12:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Utt 810g
Utt 810g Firmware
CPEs cpe:2.3:h:utt:810g:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:810g_firmware:*:*:*:*:*:*:*:*
Vendors & Products Utt 810g
Utt 810g Firmware

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt hiper 810g
Vendors & Products Utt
Utt hiper 810g

Sun, 08 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-171114. This impacts the function strcpy of the file /goform/formRemoteControl. The manipulation results in buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Title UTT HiPER 810G formRemoteControl strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Utt 810g 810g Firmware Hiper 810g
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T13:48:19.941Z

Reserved: 2026-03-07T08:46:52.539Z

Link: CVE-2026-3699

cve-icon Vulnrichment

Updated: 2026-03-10T13:48:15.727Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T03:16:04.017

Modified: 2026-03-10T15:21:15.350

Link: CVE-2026-3699

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:15:18Z

Weaknesses