Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 10 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Utt 810g
Utt 810g Firmware |
|
| CPEs | cpe:2.3:h:utt:810g:3.0:*:*:*:*:*:*:* cpe:2.3:o:utt:810g_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Utt 810g
Utt 810g Firmware |
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Utt
Utt hiper 810g |
|
| Vendors & Products |
Utt
Utt hiper 810g |
Sun, 08 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formConfigDnsFilterGlobal. This manipulation causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. | |
| Title | UTT HiPER 810G formConfigDnsFilterGlobal strcpy buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-10T13:52:11.757Z
Reserved: 2026-03-07T08:46:55.404Z
Link: CVE-2026-3700
Updated: 2026-03-10T13:51:40.683Z
Status : Analyzed
Published: 2026-03-08T03:16:05.177
Modified: 2026-03-10T15:11:17.353
Link: CVE-2026-3700
No data.
OpenCVE Enrichment
Updated: 2026-04-17T12:15:18Z