Description
A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects the function strcpy of the file /goform/formApMail. Executing a manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stack-based buffer overflow in the strcpy operation of the formApMail interface on UTT HiPER 810G devices. An attacker can provide an overly long input to the targeted form, causing the overflow to corrupt stack memory. The CVE description does not explicitly state the downstream effect, so the exact consequences remain uncertain.

Affected Systems

The flaw exists in UTT HiPER 810G hardware and its associated firmware versions up to 1.7.7‑1711. Devices running these firmware releases—and any earlier releases—are affected. The issue is tied to the /goform/formApMail entry point used by the device’s web interface.

Risk and Exploitability

The CVSS score of 8.7 places this vulnerability in the high severity band, and the EPSS score of less than 1% indicates a very low but non‑zero likelihood of exploitation at the time of assessment. The vulnerability is not listed in the CISA KEV catalog. Attackers can trigger the overflow remotely by sending a specially crafted HTTP request to the vulnerable form, which the public exploit demonstrates. The CVE description does not explicitly state any specific downstream impact such as code execution, so the precise consequences remain uncertain, but the vulnerability warrants monitoring and patching.

Generated by OpenCVE AI on April 17, 2026 at 11:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the HiPER 810G firmware to a version beyond 1.7.7‑1711 where the strcpy buffer overflow has been fixed.
  • If a firmware upgrade is not immediately possible, isolate the device by limiting network access to the /goform/formApMail endpoint so that only trusted local or administrative networks can reach it.
  • Monitor the device for anomalous traffic or known exploit signatures, and log remote POST requests to the formApMail path for forensic analysis.

Generated by OpenCVE AI on April 17, 2026 at 11:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Utt 810g
Utt 810g Firmware
CPEs cpe:2.3:h:utt:810g:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:810g_firmware:*:*:*:*:*:*:*:*
Vendors & Products Utt 810g
Utt 810g Firmware

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt hiper 810g
Vendors & Products Utt
Utt hiper 810g

Mon, 09 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 11:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects the function strcpy of the file /goform/formApMail. Executing a manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
Title UTT HiPER 810G formApMail strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Utt 810g 810g Firmware Hiper 810g
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-09T17:26:15.634Z

Reserved: 2026-03-08T17:17:36.873Z

Link: CVE-2026-3815

cve-icon Vulnrichment

Updated: 2026-03-09T17:26:11.277Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T11:16:06.230

Modified: 2026-03-10T14:27:08.747

Link: CVE-2026-3815

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:00:11Z

Weaknesses