Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 30 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Utt
Utt hiper 1250gw |
|
| Vendors & Products |
Utt
Utt hiper 1250gw |
Wed, 29 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in UTT HiPER 1250GW up to 3.2.7-210907-180535. This issue affects the function strcpy of the file route/goform/formTaskEdit_ap. The manipulation of the argument Profile leads to buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. | |
| Title | UTT HiPER 1250GW formTaskEdit_ap strcpy buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-30T13:11:06.369Z
Reserved: 2026-04-29T14:14:36.356Z
Link: CVE-2026-7419
Updated: 2026-04-30T13:11:03.372Z
Status : Deferred
Published: 2026-04-29T23:16:20.020
Modified: 2026-04-30T14:52:54.847
Link: CVE-2026-7419
No data.
OpenCVE Enrichment
Updated: 2026-04-30T03:45:06Z