Impact
The vulnerability is caused by an unchecked strcpy in the formRemoteControl endpoint of the UTT HiPER 1200GW device. This oversight permits a buffer overflow when remote data is accepted, potentially enabling an attacker to execute arbitrary code or otherwise compromise the device’s confidentiality, integrity, or availability. The flaw is a classic example of the unchecked string copy weakness identified by CWE‑119 and the resulting buffer overflow identified by CWE‑120.
Affected Systems
UTT HiPER 1200GW devices running firmware versions up to 2.5.3‑170306 are impacted. The flaw exists in the GoForm web interface, specifically the /goform/formRemoteControl handler.
Risk and Exploitability
The CVSS score of 8.7 denotes a high severity vulnerability, and the lack of an EPSS rating means current exploitation probability cannot be quantified but it remains possible. The flaw is exploitable remotely from any network that can reach the device, making it a significant risk for exposed devices. Because the vulnerability is not listed in CISA’s KEV catalog, no known publicly documented exploits have been recorded yet, but the nature of the attack vector suggests that an interested actor could craft a malicious HTTP request to trigger the overflow.
OpenCVE Enrichment