Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2935: Buffer Overflow in UTT HiPER 810G

0
High
VulnerabilityCVE-2026-2935cvecve-2026-2935
Published: Sun Feb 22 2026 (02/22/2026, 08:02:11 UTC)
Source: CVE Database V5
Vendor/Project: UTT
Product: HiPER 810G

Description

A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. This issue affects the function strcpy of the file /goform/ConfigExceptMSN. Executing a manipulation of the argument remark can lead to buffer overflow. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/02/2026, 04:30:12 UTC

Technical Analysis

CVE-2026-2935 identifies a buffer overflow vulnerability in the UTT HiPER 810G device firmware, specifically up to version 1.7.7-171114. The vulnerability resides in the strcpy function call within the /goform/ConfigExceptMSN endpoint, where the 'remark' parameter is not properly bounds-checked before being copied into a fixed-size buffer. This lack of validation allows an attacker to supply an oversized input, causing a buffer overflow. Because strcpy does not limit the number of bytes copied, the overflow can overwrite adjacent memory, potentially leading to arbitrary code execution or system crashes. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H but likely meaning high privileges on the device), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no exploits have been observed in the wild yet, a public proof-of-concept exploit is available, which could facilitate attacks by threat actors. The vulnerability affects a specific firmware version of the HiPER 810G, a device used in telecommunications and networking environments. The absence of official patches or mitigation guidance in the provided data suggests that users must implement workarounds or isolate vulnerable devices until updates are available.

Potential Impact

This vulnerability poses a significant risk to organizations deploying UTT HiPER 810G devices, particularly in telecommunications infrastructure or enterprise networks. Successful exploitation can lead to remote code execution with elevated privileges, enabling attackers to take full control of affected devices. This can result in unauthorized access to sensitive network configurations, interception or manipulation of network traffic, and disruption of network services. The compromise of such devices could serve as a foothold for lateral movement within an organization's network or as a launchpad for broader attacks. The high impact on confidentiality, integrity, and availability means that both data breaches and service outages are plausible consequences. Given the remote and unauthenticated nature of the exploit, the attack surface is broad, increasing the likelihood of exploitation attempts. Organizations relying on these devices for critical communications or infrastructure face operational and reputational risks if the vulnerability is exploited.

Mitigation Recommendations

Organizations should immediately inventory their network to identify any UTT HiPER 810G devices running firmware version 1.7.7-171114 or earlier. Since no official patches are currently referenced, network segmentation should be implemented to isolate vulnerable devices from untrusted networks, minimizing exposure. Access controls should be tightened to restrict management interfaces to trusted IP addresses only. Employing intrusion detection or prevention systems (IDS/IPS) with signatures targeting this vulnerability or the known exploit can help detect and block exploitation attempts. Monitoring network traffic for unusual activity directed at the /goform/ConfigExceptMSN endpoint is recommended. Vendors and users should engage with UTT for timely firmware updates or patches. If possible, disable or restrict access to the vulnerable endpoint until a fix is available. Regular backups of device configurations and system states should be maintained to facilitate recovery in case of compromise. Finally, organizations should educate their security teams about this vulnerability and the availability of public exploits to enhance readiness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-21T08:21:46.039Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699b6bbfbe58cf853b9fec50

Added to database: 2/22/2026, 8:49:03 PM

Last enriched: 3/2/2026, 4:30:12 AM

Last updated: 4/9/2026, 2:34:19 PM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses