Description
A security vulnerability has been detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This issue affects the function strcpy of the file /goform/formConfigDnsFilterGlobal of the component Parameter Handler. Such manipulation of the argument GroupName leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-03-26
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via buffer overflow
Action: Immediate patch
AI Analysis

Impact

The vulnerability arises from an improper use of the strcpy function within the formConfigDnsFilterGlobal component of UTT HiPER 1250GW. By supplying a crafted GroupName string exceeding the allocated buffer, an attacker can trigger a buffer overflow that potentially allows arbitrary code execution or system compromise. The exposed flaw permits remote manipulation of the input argument, resulting in uncontrolled memory corruption.

Affected Systems

The flaw affects UTT HiPER 1250GW routers running firmware versions up to 3.2.7-210907-180535. Systems with this firmware are susceptible whenever the vulnerable formConfigDnsFilterGlobal interface remains reachable from an attacker’s location.

Risk and Exploitability

With a CVSS score of 8.7, the vulnerability is considered high severity. The EPSS score is not available, but the vulnerability has been publicly disclosed and an exploit has been made available, indicating an elevated risk of real-world attacks. The flaw is not listed in the CISA KEV catalog, yet its remote exploitation potential and the availability of public exploits necessitate immediate attention.

Generated by OpenCVE AI on March 26, 2026 at 10:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest UTT firmware version that includes a fix for the strcpy buffer overflow.
  • If a patch is unavailable, restrict remote access to the /goform/formConfigDnsFilterGlobal endpoint using network firewalls or ACLs.
  • Verify that the firmware update or network restriction is effective by testing the endpoint for susceptibility to buffer overflow attempts.
  • Monitor logs for unauthorized access attempts and implement an alerting system for potential exploitation attempts.

Generated by OpenCVE AI on March 26, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt hiper 1250gw
Vendors & Products Utt
Utt hiper 1250gw

Thu, 26 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This issue affects the function strcpy of the file /goform/formConfigDnsFilterGlobal of the component Parameter Handler. Such manipulation of the argument GroupName leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
Title UTT HiPER 1250GW Parameter formConfigDnsFilterGlobal strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Utt Hiper 1250gw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-26T18:23:53.788Z

Reserved: 2026-03-25T16:33:35.461Z

Link: CVE-2026-4862

cve-icon Vulnrichment

Updated: 2026-03-26T18:23:49.984Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-26T10:16:26.850

Modified: 2026-03-30T13:26:50.827

Link: CVE-2026-4862

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T08:36:21Z

Weaknesses