Description
A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected by this issue is the function strcpy of the file /goform/getOneApConfTempEntry. Performing a manipulation results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-03-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

The flaw resides in the strcpy function used in the UTT HiPER 810G firmware’s /goform/getOneApConfTempEntry endpoint. The lack of bounds checking allows an attacker to overflow the destination buffer, leading to arbitrary code execution on the device. The vulnerability falls under CWE-119 (Improper Restriction of Operations within the Bounds of a Buffer) and CWE-120 (Classic Buffer Overflow).

Affected Systems

UTT HiPER 810G devices running firmware versions up to 1.7.7-1711 are impacted. The vulnerability is present in the 810G firmware package and affects all deployments using the vulnerable goform endpoint.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity, while the EPSS score of less than 1% suggests a low probability of exploitation under normal conditions. However, the public release of an exploit and the ability for an attacker to trigger the overflow from a remote location elevate the risk profile. The vulnerability is not listed in the CISA KEV catalog, but the exploited nature underscores the necessity for timely remediation.

Generated by OpenCVE AI on April 16, 2026 at 10:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the device firmware to a version that patches the strcpy buffer overflow (version 1.7.7‑1712 or later).
  • If an updated firmware is unavailable, restrict access to the device’s web interface to trusted internal networks and enforce firewall rules that block external traffic.
  • Disable or block the /goform/getOneApConfTempEntry endpoint through device configuration or by implementing URL filtering when possible.

Generated by OpenCVE AI on April 16, 2026 at 10:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Utt 810g
Utt 810g Firmware
CPEs cpe:2.3:h:utt:810g:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:810g_firmware:*:*:*:*:*:*:*:*
Vendors & Products Utt 810g
Utt 810g Firmware

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt hiper 810g
Vendors & Products Utt
Utt hiper 810g

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected by this issue is the function strcpy of the file /goform/getOneApConfTempEntry. Performing a manipulation results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
Title UTT HiPER 810G getOneApConfTempEntry strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Utt 810g 810g Firmware Hiper 810g
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T16:04:37.166Z

Reserved: 2026-03-08T17:17:34.092Z

Link: CVE-2026-3814

cve-icon Vulnrichment

Updated: 2026-03-10T16:04:34.357Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T10:16:03.387

Modified: 2026-03-10T14:28:37.057

Link: CVE-2026-3814

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:30:16Z

Weaknesses