Impact
The vulnerability is a stack-based buffer overflow in the strcpy operation of the formApMail interface on UTT HiPER 810G devices. An attacker can provide an overly long input to the targeted form, causing the overflow to corrupt stack memory. The CVE description does not explicitly state the downstream effect, so the exact consequences remain uncertain.
Affected Systems
The flaw exists in UTT HiPER 810G hardware and its associated firmware versions up to 1.7.7‑1711. Devices running these firmware releases—and any earlier releases—are affected. The issue is tied to the /goform/formApMail entry point used by the device’s web interface.
Risk and Exploitability
The CVSS score of 8.7 places this vulnerability in the high severity band, and the EPSS score of less than 1% indicates a very low but non‑zero likelihood of exploitation at the time of assessment. The vulnerability is not listed in the CISA KEV catalog. Attackers can trigger the overflow remotely by sending a specially crafted HTTP request to the vulnerable form, which the public exploit demonstrates. The CVE description does not explicitly state any specific downstream impact such as code execution, so the precise consequences remain uncertain, but the vulnerability warrants monitoring and patching.
OpenCVE Enrichment