Description
A vulnerability was determined in UTT HiPER 1200GW up to 2.5.3-170306. This impacts the function strcpy of the file /goform/websHostFilter. This manipulation causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-20
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a classic buffer overflow in the strcpy call within the /goform/websHostFilter endpoint of UTT HiPER 1200GW firmware up to version 2.5.3-170306. An attacker can send an overlong value to this endpoint over the network, leading to uncontrolled memory write and potentially arbitrary code execution. This flaw compromises confidentiality, integrity, and availability by allowing remote execution of arbitrary commands on the device.

Affected Systems

The affected vendor is UTT, product HiPER 1200GW. Firmware versions up to 2.5.3-170306 are vulnerable. Devices running these firmware releases should be considered at risk.

Risk and Exploitability

The CVSS base score is 8.7, classifying it as high severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog. Because the flaw is triggered remotely via an HTTP request to a publicly accessible endpoint and the exploit code is publicly available, the likelihood of exploitation is non‑negligible. A remote attacker can initiate an overflow by sending crafted input directly to the /goform/websHostFilter URL.

Generated by OpenCVE AI on March 20, 2026 at 16:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest available firmware update from UTT that addresses the strcpy buffer overflow in the websHostFilter.
  • If a patch cannot be applied immediately, restrict remote access to the device or block the /goform/websHostFilter endpoint using a firewall or access control list to limit exposure.
  • Monitor network traffic and device logs for anomalous requests targeting the /goform/websHostFilter endpoint and enforce logging to detect potential exploitation attempts.

Generated by OpenCVE AI on March 20, 2026 at 16:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt hiper 1200gw
Vendors & Products Utt
Utt hiper 1200gw

Fri, 20 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in UTT HiPER 1200GW up to 2.5.3-170306. This impacts the function strcpy of the file /goform/websHostFilter. This manipulation causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
Title UTT HiPER 1200GW websHostFilter strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Utt Hiper 1200gw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-20T18:06:56.399Z

Reserved: 2026-03-20T08:21:26.914Z

Link: CVE-2026-4487

cve-icon Vulnrichment

Updated: 2026-03-20T17:33:21.634Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T15:16:23.850

Modified: 2026-03-24T15:54:09.400

Link: CVE-2026-4487

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:29:23Z

Weaknesses