Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2846: OS Command Injection in UTT HiPER 520

0
High
VulnerabilityCVE-2026-2846cvecve-2026-2846
Published: Fri Feb 20 2026 (02/20/2026, 15:32:06 UTC)
Source: CVE Database V5
Vendor/Project: UTT
Product: HiPER 520

Description

A security vulnerability has been detected in UTT HiPER 520 1.7.7-160105. This impacts the function sub_44D264 of the file /goform/formPdbUpConfig of the component Web Management Interface. The manipulation of the argument policyNames leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:50:25 UTC

Technical Analysis

CVE-2026-2846 is an OS command injection vulnerability identified in the UTT HiPER 520 device, specifically version 1.7.7-160105. The vulnerability resides in the Web Management Interface component, within the sub_44D264 function of the /goform/formPdbUpConfig endpoint. An attacker can manipulate the 'policyNames' parameter to inject arbitrary operating system commands, which the device executes with elevated privileges. This flaw allows remote attackers to execute commands without authentication or user interaction, significantly increasing the attack surface. The vulnerability is rated with a CVSS 4.0 score of 8.6 (high severity), reflecting its ease of exploitation (network attack vector, low complexity) and the high impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public disclosure of exploit details raises the likelihood of future attacks. The absence of patches or official mitigation guidance in the provided data suggests that affected organizations must implement compensating controls promptly. The vulnerability could lead to complete device takeover, enabling attackers to disrupt network operations, exfiltrate sensitive data, or pivot to internal networks.

Potential Impact

The impact of CVE-2026-2846 is substantial for organizations deploying the UTT HiPER 520 device. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands with elevated privileges. This jeopardizes the confidentiality of sensitive information managed or routed by the device, undermines data integrity by enabling unauthorized modifications, and threatens availability through potential denial-of-service or destructive actions. As the device likely functions as a network management or routing appliance, compromise could facilitate lateral movement within enterprise networks, exposing broader infrastructure to risk. The remote, unauthenticated nature of the exploit increases the likelihood of widespread attacks, especially in environments where these devices are internet-facing or insufficiently segmented. Organizations in critical infrastructure sectors, telecommunications, and enterprises relying on UTT HiPER 520 for network management face heightened operational and security risks, including service disruption and data breaches.

Mitigation Recommendations

Given the absence of official patches or updates in the provided information, organizations should immediately implement the following mitigations: 1) Restrict network access to the Web Management Interface by enforcing strict firewall rules, allowing only trusted management IP addresses to connect. 2) Disable remote management features if not essential, or move management interfaces to isolated management VLANs or out-of-band networks. 3) Monitor network traffic and device logs for anomalous requests targeting /goform/formPdbUpConfig or suspicious command execution patterns. 4) Employ Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom signatures to detect and block attempts to exploit the policyNames parameter. 5) Conduct thorough device inventory and risk assessments to identify all affected UTT HiPER 520 devices and prioritize remediation. 6) Engage with the vendor for official patches or firmware updates and apply them promptly once available. 7) Implement network segmentation to limit potential lateral movement if a device is compromised. 8) Educate network administrators on the vulnerability and enforce strong authentication and monitoring practices for device management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T07:59:46.096Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6998ca03be58cf853bab9399

Added to database: 2/20/2026, 8:54:27 PM

Last enriched: 2/28/2026, 12:50:25 PM

Last updated: 4/6/2026, 9:11:11 PM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses