Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2935: Buffer Overflow in UTT HiPER 810G

0
High
VulnerabilityCVE-2026-2935cvecve-2026-2935
Published: Sun Feb 22 2026 (02/22/2026, 08:02:11 UTC)
Source: CVE Database V5
Vendor/Project: UTT
Product: HiPER 810G

Description

CVE-2026-2935 is a high-severity buffer overflow vulnerability in the UTT HiPER 810G device firmware up to version 1. 7. 7-171114. The flaw exists in the strcpy function within the /goform/ConfigExceptMSN file, where manipulation of the 'remark' argument can cause a buffer overflow. This vulnerability can be exploited remotely without user interaction or authentication, allowing an attacker to potentially execute arbitrary code or cause a denial of service. Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of attacks. The vulnerability impacts confidentiality, integrity, and availability due to its potential for remote code execution and system compromise. Organizations using this product should prioritize patching or mitigating this issue to prevent exploitation. The affected product is primarily used in telecommunications or networking environments, with significant deployment in countries with advanced telecom infrastructure. Immediate mitigation steps include restricting access to the vulnerable interface, implementing network-level protections, and monitoring for suspicious activity.

AI-Powered Analysis

AILast updated: 02/22/2026, 20:49:29 UTC

Technical Analysis

CVE-2026-2935 is a buffer overflow vulnerability identified in the UTT HiPER 810G device firmware versions up to 1.7.7-171114. The vulnerability arises from improper handling of input in the strcpy function within the /goform/ConfigExceptMSN file, specifically when processing the 'remark' argument. Because strcpy does not perform bounds checking, an attacker can supply an overly long input string to overflow the buffer, leading to memory corruption. This flaw is exploitable remotely over the network without requiring user interaction or authentication, making it highly accessible to attackers. Successful exploitation could allow arbitrary code execution with high privileges, potentially enabling full device compromise, unauthorized configuration changes, or denial of service. The vulnerability has a CVSS 4.0 base score of 8.6, reflecting its high impact on confidentiality, integrity, and availability, combined with low attack complexity and no required privileges or user interaction. Although no active exploitation has been reported, a public exploit is available, increasing the likelihood of future attacks. The affected product, UTT HiPER 810G, is commonly used in telecommunications and networking environments, where device compromise could disrupt critical communications infrastructure. The vulnerability does not have an official patch released yet, emphasizing the need for immediate mitigation and monitoring. The technical details confirm the vulnerability's remote attack vector and high severity, underscoring the urgency for affected organizations to address this issue promptly.

Potential Impact

The impact of CVE-2026-2935 on organizations worldwide is significant due to the potential for remote code execution on critical networking hardware without authentication or user interaction. Exploitation could lead to full device compromise, allowing attackers to intercept, modify, or disrupt network traffic, degrade service availability, or pivot into internal networks. This can result in loss of confidentiality of sensitive communications, integrity breaches through unauthorized configuration changes, and availability issues caused by device crashes or denial of service. Telecommunications providers, internet service providers, and enterprises relying on UTT HiPER 810G devices for network connectivity are at risk of operational disruption and data breaches. The availability of a public exploit increases the risk of widespread attacks, including by cybercriminals or nation-state actors targeting critical infrastructure. The vulnerability could also be leveraged as a foothold for further attacks within organizational networks, amplifying its impact. Given the device's role in communication infrastructure, exploitation could have cascading effects on dependent services and customers, potentially affecting large user bases and critical services.

Mitigation Recommendations

To mitigate CVE-2026-2935 effectively, organizations should first verify if they are using the UTT HiPER 810G device with firmware versions up to 1.7.7-171114. Immediate mitigation includes restricting network access to the vulnerable /goform/ConfigExceptMSN interface by implementing firewall rules or access control lists to limit exposure to trusted management networks only. Network segmentation should be employed to isolate vulnerable devices from untrusted networks and reduce attack surface. Monitoring network traffic for anomalous requests targeting the 'remark' parameter or unusual activity on the device management interface can help detect exploitation attempts early. Organizations should engage with UTT or authorized vendors to obtain firmware updates or patches as soon as they become available and prioritize their deployment. If patching is delayed, consider disabling or restricting the affected functionality if feasible. Additionally, employ intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability or exploit to block known attack patterns. Regularly audit device configurations and logs for signs of compromise. Finally, maintain an incident response plan tailored to network device compromises to respond swiftly if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-21T08:21:46.039Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699b6bbfbe58cf853b9fec50

Added to database: 2/22/2026, 8:49:03 PM

Last enriched: 2/22/2026, 8:49:29 PM

Last updated: 2/23/2026, 4:11:47 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats