CVE-2026-2118: Command Injection in UTT HiPER 810
A vulnerability was determined in UTT HiPER 810 1.7.4-141218. The impacted element is the function sub_4407D4 of the file /goform/formReleaseConnect of the component rehttpd. Executing a manipulation of the argument Isp_Name can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2026-2118 is a command injection vulnerability identified in UTT HiPER 810 firmware version 1.7.4-141218. The vulnerability resides in the function sub_4407D4 of the /goform/formReleaseConnect endpoint within the rehttpd component. Specifically, the vulnerability arises from improper sanitization of the Isp_Name parameter, which an attacker can manipulate to inject and execute arbitrary system commands remotely. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it highly accessible to attackers. The CVSS 4.0 score is 8.6, reflecting its high severity due to network attack vector, low attack complexity, and no privileges or user interaction needed. Exploitation could allow attackers to gain control over the device, execute arbitrary commands, disrupt services, or pivot within a network. Although no active exploits have been reported in the wild, the public disclosure of exploit details increases the likelihood of exploitation attempts. The affected product, UTT HiPER 810, is used primarily in telecommunications and networking environments, where device compromise could lead to significant operational disruptions and data breaches. The vulnerability impacts confidentiality, integrity, and availability, as attackers can execute arbitrary commands that may lead to data exfiltration, system manipulation, or denial of service.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for telecommunications providers, ISPs, and enterprises relying on UTT HiPER 810 devices. Successful exploitation could lead to unauthorized command execution, resulting in potential data breaches, service outages, or lateral movement within corporate networks. The compromise of network infrastructure devices can disrupt critical communications and services, impacting business continuity and regulatory compliance, particularly under GDPR and NIS Directive requirements. Given the remote exploitability without authentication, attackers can target exposed devices over the internet or internal networks, increasing the attack surface. The public availability of exploit details further elevates the threat level, potentially leading to targeted attacks against European telecom infrastructure and enterprises using this product. Disruption or compromise of these devices could have cascading effects on dependent services and customers, amplifying the operational and reputational damage.
Mitigation Recommendations
Organizations should immediately verify if they are running UTT HiPER 810 version 1.7.4-141218 and prioritize patching to the latest firmware version provided by UTT that addresses this vulnerability. If patches are not yet available, implement network-level controls such as firewall rules to restrict access to the /goform/formReleaseConnect endpoint, limiting it to trusted management networks only. Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect command injection attempts targeting the Isp_Name parameter. Conduct thorough network scans to identify exposed devices and isolate them until mitigated. Regularly audit device configurations and logs for anomalous commands or access patterns. Additionally, segment critical network infrastructure to reduce the impact of a compromised device and enforce strict access controls. Engage with UTT support channels for updates and guidance. Finally, incorporate this vulnerability into incident response plans to ensure rapid containment if exploitation is detected.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2026-2118: Command Injection in UTT HiPER 810
Description
A vulnerability was determined in UTT HiPER 810 1.7.4-141218. The impacted element is the function sub_4407D4 of the file /goform/formReleaseConnect of the component rehttpd. Executing a manipulation of the argument Isp_Name can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2026-2118 is a command injection vulnerability identified in UTT HiPER 810 firmware version 1.7.4-141218. The vulnerability resides in the function sub_4407D4 of the /goform/formReleaseConnect endpoint within the rehttpd component. Specifically, the vulnerability arises from improper sanitization of the Isp_Name parameter, which an attacker can manipulate to inject and execute arbitrary system commands remotely. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it highly accessible to attackers. The CVSS 4.0 score is 8.6, reflecting its high severity due to network attack vector, low attack complexity, and no privileges or user interaction needed. Exploitation could allow attackers to gain control over the device, execute arbitrary commands, disrupt services, or pivot within a network. Although no active exploits have been reported in the wild, the public disclosure of exploit details increases the likelihood of exploitation attempts. The affected product, UTT HiPER 810, is used primarily in telecommunications and networking environments, where device compromise could lead to significant operational disruptions and data breaches. The vulnerability impacts confidentiality, integrity, and availability, as attackers can execute arbitrary commands that may lead to data exfiltration, system manipulation, or denial of service.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for telecommunications providers, ISPs, and enterprises relying on UTT HiPER 810 devices. Successful exploitation could lead to unauthorized command execution, resulting in potential data breaches, service outages, or lateral movement within corporate networks. The compromise of network infrastructure devices can disrupt critical communications and services, impacting business continuity and regulatory compliance, particularly under GDPR and NIS Directive requirements. Given the remote exploitability without authentication, attackers can target exposed devices over the internet or internal networks, increasing the attack surface. The public availability of exploit details further elevates the threat level, potentially leading to targeted attacks against European telecom infrastructure and enterprises using this product. Disruption or compromise of these devices could have cascading effects on dependent services and customers, amplifying the operational and reputational damage.
Mitigation Recommendations
Organizations should immediately verify if they are running UTT HiPER 810 version 1.7.4-141218 and prioritize patching to the latest firmware version provided by UTT that addresses this vulnerability. If patches are not yet available, implement network-level controls such as firewall rules to restrict access to the /goform/formReleaseConnect endpoint, limiting it to trusted management networks only. Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect command injection attempts targeting the Isp_Name parameter. Conduct thorough network scans to identify exposed devices and isolate them until mitigated. Regularly audit device configurations and logs for anomalous commands or access patterns. Additionally, segment critical network infrastructure to reduce the impact of a compromised device and enforce strict access controls. Engage with UTT support channels for updates and guidance. Finally, incorporate this vulnerability into incident response plans to ensure rapid containment if exploitation is detected.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-06T14:44:52.536Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69884451f9fa50a62f927d90
Added to database: 2/8/2026, 8:07:45 AM
Last enriched: 2/8/2026, 8:08:01 AM
Last updated: 2/8/2026, 10:29:08 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2147: Information Disclosure in Tenda AC21
MediumCVE-2026-2146: Unrestricted Upload in guchengwuyue yshopmall
MediumCVE-2026-2145: Cross Site Scripting in cym1102 nginxWebUI
MediumCVE-2026-2143: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2142: OS Command Injection in D-Link DIR-823X
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.