Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2904: Buffer Overflow in UTT HiPER 810G

0
High
VulnerabilityCVE-2026-2904cvecve-2026-2904
Published: Sun Feb 22 2026 (02/22/2026, 00:32:11 UTC)
Source: CVE Database V5
Vendor/Project: UTT
Product: HiPER 810G

Description

CVE-2026-2904 is a high-severity buffer overflow vulnerability in UTT HiPER 810G version 1. 7. 7-171114, specifically in the strcpy function within the /goform/ConfigExceptAli file. The flaw allows remote attackers to execute a buffer overflow without requiring user interaction or prior authentication. This vulnerability can lead to severe consequences including remote code execution or denial of service due to corruption of memory. Although no public exploits are currently known in the wild, the exploit code has been publicly disclosed, increasing the risk of exploitation. The vulnerability affects a specific version of the UTT HiPER 810G device, which is likely used in network or telecommunications infrastructure. Organizations using this device should prioritize patching or mitigating this issue to prevent potential compromise. The CVSS 4. 0 score of 8.

AI-Powered Analysis

AILast updated: 02/22/2026, 01:16:31 UTC

Technical Analysis

CVE-2026-2904 identifies a critical buffer overflow vulnerability in the UTT HiPER 810G device, version 1.7.7-171114. The vulnerability resides in the strcpy function used in the /goform/ConfigExceptAli endpoint, which improperly handles input data, allowing an attacker to overflow the buffer. This flaw can be exploited remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. The buffer overflow can lead to memory corruption, potentially enabling remote code execution or causing denial of service conditions. The vulnerability was publicly disclosed shortly after being reserved, and while no confirmed exploits are currently observed in the wild, the availability of exploit code increases the risk of imminent attacks. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). This suggests that an attacker with limited privileges on the network could fully compromise the device. The affected product, UTT HiPER 810G, is likely used in telecommunications or enterprise network environments, making the vulnerability a significant threat to network infrastructure security. No official patches are currently linked, emphasizing the need for interim mitigations.

Potential Impact

The impact of CVE-2026-2904 is substantial for organizations relying on UTT HiPER 810G devices. Successful exploitation can lead to complete compromise of the affected device, allowing attackers to execute arbitrary code, disrupt network services, or pivot to other internal systems. This threatens confidentiality by exposing sensitive configuration or network data, integrity by allowing unauthorized changes, and availability by causing device crashes or service outages. Given the device’s probable role in network infrastructure, exploitation could disrupt critical communications or data flows. The remote, unauthenticated nature of the attack vector increases the likelihood of exploitation, especially in environments with exposed management interfaces or insufficient network segmentation. Organizations in telecommunications, government, and enterprises using this device face risks of espionage, sabotage, or ransomware attacks leveraging this vulnerability. The lack of current patches and public exploit code availability further elevates the threat level globally.

Mitigation Recommendations

1. Immediately restrict network access to the UTT HiPER 810G device, especially to the /goform/ConfigExceptAli endpoint, using firewalls or access control lists to limit exposure to trusted management networks only. 2. Implement network segmentation to isolate vulnerable devices from general user and internet-facing networks. 3. Monitor network traffic and device logs for unusual activity or attempts to access the vulnerable endpoint. 4. Engage with UTT vendor support to obtain official patches or firmware updates addressing this vulnerability; prioritize deployment once available. 5. If patches are not yet available, consider temporary mitigations such as disabling or restricting the vulnerable service or endpoint if feasible. 6. Conduct thorough vulnerability scanning and penetration testing to identify any exploitation attempts. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential compromise. 8. Educate network administrators about the vulnerability and ensure strict credential management to prevent privilege escalation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T20:08:08.431Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699a5593be58cf853b7fcbb1

Added to database: 2/22/2026, 1:02:11 AM

Last enriched: 2/22/2026, 1:16:31 AM

Last updated: 2/22/2026, 6:17:10 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats