Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Utt
Utt hiper 1250gw |
|
| Vendors & Products |
Utt
Utt hiper 1250gw |
Fri, 20 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in UTT HiPER 1250GW up to 3.2.7-210907-180535. Affected is the function strcpy of the file /goform/setSysAdm. Such manipulation of the argument GroupName leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. | |
| Title | UTT HiPER 1250GW setSysAdm strcpy buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-20T19:59:01.311Z
Reserved: 2026-03-20T08:21:30.384Z
Link: CVE-2026-4488
Updated: 2026-03-20T19:58:57.511Z
Status : Deferred
Published: 2026-03-20T16:16:19.093
Modified: 2026-04-22T21:32:08.360
Link: CVE-2026-4488
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:29:18Z