Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
UTT HiPER 810G allows remote code execution via buffer overflow
CVE-2026-2981
Summary
A software flaw in UTT HiPER 810G's form processing code could allow an attacker to take control of the system by sending malicious data. This could potentially lead to unauthorized access and disruption of the system. Users should update the software to the latest version to fix the issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| utt | 810g_firmware | <= 1.7.7-171114 | – |
Original title
A vulnerability was found in UTT HiPER 810G up to 1.7.7-1711. The affected element is the function strcpy of the file /goform/formTaskEdit_ap. The manipulation of the argument txtMin2 results in bu...
Original description
A vulnerability was found in UTT HiPER 810G up to 1.7.7-1711. The affected element is the function strcpy of the file /goform/formTaskEdit_ap. The manipulation of the argument txtMin2 results in buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-120
Classic Buffer Overflow
- https://github.com/7wkajk/CVE-VUL/blob/main/5.md Exploit Third Party Advisory
- https://github.com/7wkajk/CVE-VUL/blob/main/5.md#poc Exploit Third Party Advisory
- https://vuldb.com/?ctiid.347365 Permissions Required VDB Entry
- https://vuldb.com/?id.347365 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.756131 Third Party Advisory VDB Entry
Published: 23 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026