Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3700: Buffer Overflow in UTT HiPER 810G

0
High
VulnerabilityCVE-2026-3700cvecve-2026-3700
Published: Sun Mar 08 2026 (03/08/2026, 02:32:10 UTC)
Source: CVE Database V5
Vendor/Project: UTT
Product: HiPER 810G

Description

CVE-2026-3700 is a high-severity buffer overflow vulnerability in UTT HiPER 810G devices up to version 1. 7. 7-171114. The flaw exists in the strcpy function within the /goform/formConfigDnsFilterGlobal file, allowing remote attackers to cause a buffer overflow without authentication or user interaction. Exploitation can lead to complete compromise of confidentiality, integrity, and availability of affected devices. Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of attacks. The vulnerability has a CVSS 4. 0 score of 8. 7, reflecting its ease of remote exploitation and severe impact. Organizations using UTT HiPER 810G should prioritize patching or mitigating this issue to prevent potential remote code execution or denial of service.

AI-Powered Analysis

AILast updated: 03/08/2026, 03:36:59 UTC

Technical Analysis

CVE-2026-3700 identifies a critical buffer overflow vulnerability in the UTT HiPER 810G device firmware versions up to 1.7.7-171114. The vulnerability arises from improper handling of input in the strcpy function located in the /goform/formConfigDnsFilterGlobal endpoint. This function copies user-supplied data without bounds checking, enabling an attacker to overflow the buffer remotely. The flaw does not require authentication or user interaction, making it highly exploitable over the network. Successful exploitation can lead to arbitrary code execution, allowing attackers to gain control over the device, disrupt services, or exfiltrate sensitive information. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low complexity, no authentication, no user interaction, and high impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, a public exploit code is available, increasing the likelihood of future attacks. The vulnerability affects a widely used network device, often deployed in enterprise and industrial environments, making it a significant security concern.

Potential Impact

The impact of CVE-2026-3700 is substantial for organizations relying on UTT HiPER 810G devices. Exploitation can lead to full compromise of affected devices, including unauthorized access, data leakage, service disruption, and potential lateral movement within networks. Given the device's role in network infrastructure, attackers could manipulate DNS filtering configurations, degrade network security, or cause denial of service. This could affect operational continuity, data confidentiality, and integrity, particularly in environments where these devices are integral to network management or security enforcement. The availability of a public exploit increases the risk of widespread attacks, potentially targeting critical infrastructure sectors, enterprises, and service providers. The vulnerability's remote exploitability without authentication further exacerbates its threat level, making it a prime target for attackers seeking to gain footholds in networks.

Mitigation Recommendations

To mitigate CVE-2026-3700, organizations should immediately verify if they are running affected versions of UTT HiPER 810G firmware (up to 1.7.7-171114) and apply any available vendor patches or firmware updates once released. In the absence of patches, network-level mitigations should be implemented, such as restricting access to the management interface and the /goform/formConfigDnsFilterGlobal endpoint using firewall rules or network segmentation to limit exposure. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for exploit attempts targeting this vulnerability. Regularly audit device configurations and logs for unusual activity. Additionally, consider deploying web application firewalls (WAF) capable of detecting and blocking buffer overflow attack patterns. Organizations should also maintain an inventory of affected devices and prioritize their remediation based on criticality. Finally, coordinate with UTT support channels for guidance and updates on official patches or workarounds.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-07T08:46:55.404Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69aceb852904315ca3579219

Added to database: 3/8/2026, 3:22:45 AM

Last enriched: 3/8/2026, 3:36:59 AM

Last updated: 3/8/2026, 4:46:52 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses