Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2118: Command Injection in UTT HiPER 810

0
High
VulnerabilityCVE-2026-2118cvecve-2026-2118
Published: Sun Feb 08 2026 (02/08/2026, 00:02:07 UTC)
Source: CVE Database V5
Vendor/Project: UTT
Product: HiPER 810

Description

A vulnerability was determined in UTT HiPER 810 1.7.4-141218. The impacted element is the function sub_4407D4 of the file /goform/formReleaseConnect of the component rehttpd. Executing a manipulation of the argument Isp_Name can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 02/08/2026, 08:08:01 UTC

Technical Analysis

CVE-2026-2118 is a command injection vulnerability identified in UTT HiPER 810 firmware version 1.7.4-141218. The vulnerability resides in the function sub_4407D4 of the /goform/formReleaseConnect endpoint within the rehttpd component. Specifically, the vulnerability arises from improper sanitization of the Isp_Name parameter, which an attacker can manipulate to inject and execute arbitrary system commands remotely. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it highly accessible to attackers. The CVSS 4.0 score is 8.6, reflecting its high severity due to network attack vector, low attack complexity, and no privileges or user interaction needed. Exploitation could allow attackers to gain control over the device, execute arbitrary commands, disrupt services, or pivot within a network. Although no active exploits have been reported in the wild, the public disclosure of exploit details increases the likelihood of exploitation attempts. The affected product, UTT HiPER 810, is used primarily in telecommunications and networking environments, where device compromise could lead to significant operational disruptions and data breaches. The vulnerability impacts confidentiality, integrity, and availability, as attackers can execute arbitrary commands that may lead to data exfiltration, system manipulation, or denial of service.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for telecommunications providers, ISPs, and enterprises relying on UTT HiPER 810 devices. Successful exploitation could lead to unauthorized command execution, resulting in potential data breaches, service outages, or lateral movement within corporate networks. The compromise of network infrastructure devices can disrupt critical communications and services, impacting business continuity and regulatory compliance, particularly under GDPR and NIS Directive requirements. Given the remote exploitability without authentication, attackers can target exposed devices over the internet or internal networks, increasing the attack surface. The public availability of exploit details further elevates the threat level, potentially leading to targeted attacks against European telecom infrastructure and enterprises using this product. Disruption or compromise of these devices could have cascading effects on dependent services and customers, amplifying the operational and reputational damage.

Mitigation Recommendations

Organizations should immediately verify if they are running UTT HiPER 810 version 1.7.4-141218 and prioritize patching to the latest firmware version provided by UTT that addresses this vulnerability. If patches are not yet available, implement network-level controls such as firewall rules to restrict access to the /goform/formReleaseConnect endpoint, limiting it to trusted management networks only. Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect command injection attempts targeting the Isp_Name parameter. Conduct thorough network scans to identify exposed devices and isolate them until mitigated. Regularly audit device configurations and logs for anomalous commands or access patterns. Additionally, segment critical network infrastructure to reduce the impact of a compromised device and enforce strict access controls. Engage with UTT support channels for updates and guidance. Finally, incorporate this vulnerability into incident response plans to ensure rapid containment if exploitation is detected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T14:44:52.536Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69884451f9fa50a62f927d90

Added to database: 2/8/2026, 8:07:45 AM

Last enriched: 2/8/2026, 8:08:01 AM

Last updated: 2/8/2026, 10:29:08 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats