Description
A vulnerability was identified in UTT HiPER 1250GW up to 3.2.7-210907-180535. Affected is the function strcpy of the file /goform/setSysAdm. Such manipulation of the argument GroupName leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Published: 2026-03-20
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow exists in the file /goform/setSysAdm within UTT HiPER 1250GW. The overflow is triggered by the argument GroupName passed to the strcpy function. This flaw allows an attacker to send crafted data that exceeds the allocated buffer, potentially overwriting control data on the stack and enabling arbitrary code execution. The issue is classified as a serious memory safety violation (CWE-119) and a stack-based buffer overflow (CWE-120).

Affected Systems

The vulnerability affects UTT's HiPER 1250GW product. Versions up to 3.2.7‑210907‑180535 are impacted. No other vendor or product versions are listed as affected.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.7, indicating high severity. No EPSS score is publicly available, and the flaw is not currently listed in the CISA KEV catalog, but publicly available exploits have been identified. The description notes that the attack can be launched remotely; it is inferred that remote access to the /goform/setSysAdm HTTP endpoint is required to exploit the flaw. Given the high CVSS and the availability of exploits, the risk to systems exposing this endpoint is substantial, especially if they are reachable from untrusted networks.

Generated by OpenCVE AI on March 20, 2026 at 17:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade UTT HiPER 1250GW to a version newer than 3.2.7‑210907‑180535, the latest patch released by the vendor.
  • If an immediate upgrade is not possible, block or restrict network traffic to the /goform/setSysAdm endpoint and enforce strict input validation on the GroupName field to limit its length.
  • Apply network segmentation or firewall rules to isolate the device from external networks and monitor for anomalous requests to the vulnerable endpoint.
  • Consult the vendor for additional mitigation guidance and confirm that the applied patch resolves the buffer overflow flaw.

Generated by OpenCVE AI on March 20, 2026 at 17:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt hiper 1250gw
Vendors & Products Utt
Utt hiper 1250gw

Fri, 20 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in UTT HiPER 1250GW up to 3.2.7-210907-180535. Affected is the function strcpy of the file /goform/setSysAdm. Such manipulation of the argument GroupName leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Title UTT HiPER 1250GW setSysAdm strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Utt Hiper 1250gw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-20T19:59:01.311Z

Reserved: 2026-03-20T08:21:30.384Z

Link: CVE-2026-4488

cve-icon Vulnrichment

Updated: 2026-03-20T19:58:57.511Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T16:16:19.093

Modified: 2026-03-24T15:54:09.400

Link: CVE-2026-4488

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:29:18Z

Weaknesses