Description
A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formConfigDnsFilterGlobal. This manipulation causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a classic buffer overflow that occurs when the strcpy function copies user input into a fixed‑size buffer on the /goform/formConfigDnsFilterGlobal endpoint of UTT HiPER 810G devices. The overflow can be exploited to overwrite adjacent memory and execute arbitrary code on the device. The issue is classified as CWE‑119 and CWE‑120 and is rated high severity with a CVSS score of 8.7. If successfully triggered, an attacker could gain full control of the device, compromising confidentiality, integrity, and availability of the network segment it serves.

Affected Systems

All UTT HiPER 810G units running firmware version 1.7.7‑171114 or earlier are affected. The problem is present in the 3.0 hardware revision and earlier firmware releases, and the vendor’s documentation indicates that the vulnerability was addressed only in later updates beyond 1.7.7‑171114.

Risk and Exploitability

The CVSS score of 8.7 reflects a high risk of remote code execution. Exploit probability is rated < 1% by EPSS, indicating that widespread attacks are unlikely but the vulnerability remains a potential threat. It is not listed in CISA’s KEV catalog, but an exploit is publicly available. Based on the description, the likely attack vector is remotely sending crafted data to the web‑based form endpoint, which can be performed over the network without local privileges. An attacker with access to the device’s network or management interface could trigger the overflow and achieve arbitrary code execution. Consequently, administrators should treat this flaw as a serious threat.

Generated by OpenCVE AI on April 17, 2026 at 12:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the UTT HiPER 810G firmware to a version newer than 1.7.7‑171114 that patches the strcpy buffer overflow in /goform/formConfigDnsFilterGlobal.
  • If a newer firmware release is unavailable, isolate the device by restricting external access to its management web interface and allow only trusted internal IP addresses.
  • Enable comprehensive logging on the device and monitor for anomalous POST requests to /goform/formConfigDnsFilterGlobal, raising alerts for suspicious activity.

Generated by OpenCVE AI on April 17, 2026 at 12:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Utt 810g
Utt 810g Firmware
CPEs cpe:2.3:h:utt:810g:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:810g_firmware:*:*:*:*:*:*:*:*
Vendors & Products Utt 810g
Utt 810g Firmware

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt hiper 810g
Vendors & Products Utt
Utt hiper 810g

Sun, 08 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formConfigDnsFilterGlobal. This manipulation causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Title UTT HiPER 810G formConfigDnsFilterGlobal strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Utt 810g 810g Firmware Hiper 810g
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T13:52:11.757Z

Reserved: 2026-03-07T08:46:55.404Z

Link: CVE-2026-3700

cve-icon Vulnrichment

Updated: 2026-03-10T13:51:40.683Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T03:16:05.177

Modified: 2026-03-10T15:11:17.353

Link: CVE-2026-3700

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:15:18Z

Weaknesses