Impact
The flaw resides in the strcpy function used in the UTT HiPER 810G firmware’s /goform/getOneApConfTempEntry endpoint. The lack of bounds checking allows an attacker to overflow the destination buffer, leading to arbitrary code execution on the device. The vulnerability falls under CWE-119 (Improper Restriction of Operations within the Bounds of a Buffer) and CWE-120 (Classic Buffer Overflow).
Affected Systems
UTT HiPER 810G devices running firmware versions up to 1.7.7-1711 are impacted. The vulnerability is present in the 810G firmware package and affects all deployments using the vulnerable goform endpoint.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, while the EPSS score of less than 1% suggests a low probability of exploitation under normal conditions. However, the public release of an exploit and the ability for an attacker to trigger the overflow from a remote location elevate the risk profile. The vulnerability is not listed in the CISA KEV catalog, but the exploited nature underscores the necessity for timely remediation.
OpenCVE Enrichment