Impact
The vulnerability is a classic buffer overflow in the strcpy call within the /goform/websHostFilter endpoint of UTT HiPER 1200GW firmware up to version 2.5.3-170306. An attacker can send an overlong value to this endpoint over the network, leading to uncontrolled memory write and potentially arbitrary code execution. This flaw compromises confidentiality, integrity, and availability by allowing remote execution of arbitrary commands on the device.
Affected Systems
The affected vendor is UTT, product HiPER 1200GW. Firmware versions up to 2.5.3-170306 are vulnerable. Devices running these firmware releases should be considered at risk.
Risk and Exploitability
The CVSS base score is 8.7, classifying it as high severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog. Because the flaw is triggered remotely via an HTTP request to a publicly accessible endpoint and the exploit code is publicly available, the likelihood of exploitation is non‑negligible. A remote attacker can initiate an overflow by sending crafted input directly to the /goform/websHostFilter URL.
OpenCVE Enrichment