Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
UTT HiPER 810G: Buffer Overflow in GroupName Input
CVE-2026-3015
Summary
A security flaw in the UTT HiPER 810G allows an attacker to potentially overflow a buffer with malicious input in the GroupName field, which could lead to unauthorized access. This issue affects remote users and has been publicly disclosed, so it's essential to update the software to the latest version to prevent exploitation.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| utt | 810g_firmware | <= 1.7.7-171114 | – |
Original title
A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/formPolicyRouteConf. Executing a manipulation of the argument GroupName can ...
Original description
A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/formPolicyRouteConf. Executing a manipulation of the argument GroupName can lead to buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-120
Classic Buffer Overflow
- https://github.com/xhsy0314/CVEReport/blob/main/UTT-1/README.md Exploit Third Party Advisory
- https://github.com/xhsy0314/CVEReport/blob/main/UTT-1/README.md#poc Exploit Third Party Advisory
- https://vuldb.com/?ctiid.347375 Permissions Required VDB Entry
- https://vuldb.com/?id.347375 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.756248 Third Party Advisory VDB Entry
Published: 23 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026