Impact
The vulnerability is a classic buffer overflow that occurs when the strcpy function copies user input into a fixed‑size buffer on the /goform/formConfigDnsFilterGlobal endpoint of UTT HiPER 810G devices. The overflow can be exploited to overwrite adjacent memory and execute arbitrary code on the device. The issue is classified as CWE‑119 and CWE‑120 and is rated high severity with a CVSS score of 8.7. If successfully triggered, an attacker could gain full control of the device, compromising confidentiality, integrity, and availability of the network segment it serves.
Affected Systems
All UTT HiPER 810G units running firmware version 1.7.7‑171114 or earlier are affected. The problem is present in the 3.0 hardware revision and earlier firmware releases, and the vendor’s documentation indicates that the vulnerability was addressed only in later updates beyond 1.7.7‑171114.
Risk and Exploitability
The CVSS score of 8.7 reflects a high risk of remote code execution. Exploit probability is rated < 1% by EPSS, indicating that widespread attacks are unlikely but the vulnerability remains a potential threat. It is not listed in CISA’s KEV catalog, but an exploit is publicly available. Based on the description, the likely attack vector is remotely sending crafted data to the web‑based form endpoint, which can be performed over the network without local privileges. An attacker with access to the device’s network or management interface could trigger the overflow and achieve arbitrary code execution. Consequently, administrators should treat this flaw as a serious threat.
OpenCVE Enrichment