Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 06 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Utt 810
Utt 810 Firmware |
|
| CPEs | cpe:2.3:h:utt:810:-:*:*:*:*:*:*:* cpe:2.3:o:utt:810_firmware:1.7.4-141218:*:*:*:*:*:*:* |
|
| Vendors & Products |
Utt 810
Utt 810 Firmware |
Tue, 20 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 20 Jan 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Utt
Utt hiper 810 |
|
| Vendors & Products |
Utt
Utt hiper 810 |
Mon, 19 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in UTT HiPER 810 1.7.4-141218. The impacted element is the function strcpy of the file /goform/setSysAdm. This manipulation of the argument passwd1 causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used. | |
| Title | UTT HiPER 810 setSysAdm strcpy buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T08:47:39.436Z
Reserved: 2026-01-18T20:34:32.193Z
Link: CVE-2026-1162
Updated: 2026-01-20T21:34:05.955Z
Status : Analyzed
Published: 2026-01-19T17:15:50.087
Modified: 2026-02-06T19:18:18.280
Link: CVE-2026-1162
No data.
OpenCVE Enrichment
Updated: 2026-04-18T05:15:15Z