CVE-2026-3016

A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. The affected element is the function strcpy of the file /goform/formP2PLimitConfig. The manipulation of the argument except leads to buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
References
Link Resource
https://github.com/xhsy0314/CVEReport/blob/main/UTT-2/README.md Exploit Third Party Advisory
https://github.com/xhsy0314/CVEReport/blob/main/UTT-2/README.md#poc Exploit Third Party Advisory
https://vuldb.com/?ctiid.347376 Permissions Required VDB Entry
https://vuldb.com/?id.347376 Third Party Advisory VDB Entry
https://vuldb.com/?submit.756249 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:utt:810g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:utt:810g:3.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-23 16:29

Updated : 2026-02-24 21:40


NVD link : CVE-2026-3016

Mitre link : CVE-2026-3016

CVE.ORG link : CVE-2026-3016


JSON object : View

Products Affected

utt

  • 810g_firmware
  • 810g
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')