Impact
The vulnerability arises from an improper use of the strcpy function within the formConfigDnsFilterGlobal component of UTT HiPER 1250GW. By supplying a crafted GroupName string exceeding the allocated buffer, an attacker can trigger a buffer overflow that potentially allows arbitrary code execution or system compromise. The exposed flaw permits remote manipulation of the input argument, resulting in uncontrolled memory corruption.
Affected Systems
The flaw affects UTT HiPER 1250GW routers running firmware versions up to 3.2.7-210907-180535. Systems with this firmware are susceptible whenever the vulnerable formConfigDnsFilterGlobal interface remains reachable from an attacker’s location.
Risk and Exploitability
With a CVSS score of 8.7, the vulnerability is considered high severity. The EPSS score is not available, but the vulnerability has been publicly disclosed and an exploit has been made available, indicating an elevated risk of real-world attacks. The flaw is not listed in the CISA KEV catalog, yet its remote exploitation potential and the availability of public exploits necessitate immediate attention.
OpenCVE Enrichment