Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 10 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Utt 810g
Utt 810g Firmware |
|
| CPEs | cpe:2.3:h:utt:810g:3.0:*:*:*:*:*:*:* cpe:2.3:o:utt:810g_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Utt 810g
Utt 810g Firmware |
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Utt
Utt hiper 810g |
|
| Vendors & Products |
Utt
Utt hiper 810g |
Mon, 09 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects the function strcpy of the file /goform/formApMail. Executing a manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. | |
| Title | UTT HiPER 810G formApMail strcpy buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-09T17:26:15.634Z
Reserved: 2026-03-08T17:17:36.873Z
Link: CVE-2026-3815
Updated: 2026-03-09T17:26:11.277Z
Status : Analyzed
Published: 2026-03-09T11:16:06.230
Modified: 2026-03-10T14:27:08.747
Link: CVE-2026-3815
No data.
OpenCVE Enrichment
Updated: 2026-04-17T12:00:11Z