Description
A security vulnerability has been detected in UTT HiPER 1200GW up to 2.5.3-170306. This vulnerability affects the function strcpy of the file /goform/formNatStaticMap. The manipulation of the argument NatBind leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-04-13
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow leading to possible code execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a classic buffer overflow in the strcpy implementation within the formNatStaticMap handler. By providing a specially crafted NatBind argument, an attacker can overflow the fixed‑size buffer, corrupting adjacent memory. Depending on the firmware’s memory layout, this could allow arbitrary code execution or destabilize the device, potentially exposing sensitive configuration or control. The weakness is a classic stack buffer overflow (CWE‑119) and related to unsafe string handling (CWE‑120).

Affected Systems

The flaw affects all UTT HiPER 1200GW appliances running firmware versions up to 2.5.3‑170306. Devices manufactured or sold by UTT under the HiPER 1200GW line are impacted. No other vendors or versions are explicitly listed. The attack vector is remote, as the vulnerable endpoint is accessible over the management interface.

Risk and Exploitability

The CVSS base score is 8.7, indicating high severity. EPSS data is unavailable, but public disclosures and code are already available, implying the exploit is likely to be used by malicious actors. Because the vulnerability is remote and the exploit can be crafted with standard tools, the operational risk is high for any exposed HiPER 1200GW device. KEV does not list it, but the public presence suggests a real threat.

Generated by OpenCVE AI on April 13, 2026 at 16:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the UTT HiPER 1200GW firmware to a version newer than 2.5.3‑170306 where the strcpy issue is fixed.
  • If an immediate firmware upgrade is not possible, block or limit external access to the /goform/formNatStaticMap endpoint using a firewall or network segmentation.
  • Continuously monitor device logs and configuration for any signs of unauthorized activity or exploitation attempts.

Generated by OpenCVE AI on April 13, 2026 at 16:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Utt
Utt hiper 1200gw
Vendors & Products Utt
Utt hiper 1200gw

Mon, 13 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in UTT HiPER 1200GW up to 2.5.3-170306. This vulnerability affects the function strcpy of the file /goform/formNatStaticMap. The manipulation of the argument NatBind leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
Title UTT HiPER 1200GW formNatStaticMap strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Utt Hiper 1200gw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-14T19:37:43.525Z

Reserved: 2026-04-13T08:33:39.778Z

Link: CVE-2026-6186

cve-icon Vulnrichment

Updated: 2026-04-14T19:35:50.608Z

cve-icon NVD

Status : Deferred

Published: 2026-04-13T16:16:35.827

Modified: 2026-04-22T20:23:16.350

Link: CVE-2026-6186

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:34:13Z

Weaknesses