High (8.8)

UTT HiPER 810G Buffer Overflow RCE (CVE-2026-3015)

CVE-2026-3015

High-severity buffer overflow (CVSS 8.8) in UTT HiPER 810G ≤1.7.7-171114 allows remote attackers to execute arbitrary code via GroupName parameter. Apply firmware update immediately.

Affected: Utt 810g Firmware Utt 810g

Vendor-confirmed - CVE-2026-3015 is a high-severity buffer overflow in UTT HiPER 810G firmware up to 1.7.7-171114 that lets an unauthenticated remote attacker crash the device or execute arbitrary code by sending a crafted network request. Update immediately to a firmware version newer than 1.7.7-171114.

Overview

A critical security flaw has been identified in certain versions of the UTT HiPER 810G router firmware. This vulnerability allows a remote attacker to potentially crash the device or execute malicious code by sending a specially crafted network request.

Vulnerability Explanation

In simple terms, the vulnerability exists in a specific part of the router’s web management interface. A function responsible for handling the “GroupName” field in a configuration form does not properly check the size of the input data. An attacker can send a request with an overly long GroupName, which overflows a memory buffer. This type of flaw, known as a buffer overflow, can corrupt the router’s normal processes and give an attacker a foothold to take control.

Impact Assessment

The impact of this vulnerability is severe (CVSS: 8.8 - HIGH). A successful exploit could allow an unauthenticated, remote attacker to:

  • Cause a denial-of-service (DoS), rendering the router inoperable and disrupting all network connectivity.
  • Potentially execute arbitrary code on the router, which could lead to a complete compromise. This might enable the attacker to intercept traffic, change network settings, or use the device as a launch point for attacks on the internal network. The exploit details are publicly available, increasing the risk of active attacks.

Remediation and Mitigation

Immediate action is required to protect affected devices.

Primary Action - Firmware Update:

  1. Check your firmware version. Log into your HiPER 810G web admin panel and navigate to the system information page.
  2. If your firmware is version 1.7.7-171114 or older, you are vulnerable.
  3. Upgrade immediately. Contact UTT support or check their official website for a firmware version newer than 1.7.7-171114 that addresses CVE-2026-3015. Apply the update following the vendor’s instructions.

Interim Mitigation (If Update is Not Immediately Possible):

  • Restrict Access: If possible, configure firewall rules to restrict access to the router’s web management interface (typically ports 80/HTTP and 443/HTTPS) to only trusted, necessary administrative IP addresses. Do not expose this interface directly to the internet.
  • Monitor for Compromise: Be alert for signs of device instability, unexpected configuration changes, or unusual network traffic.

All users of the UTT HiPER 810G should verify their firmware version and apply the necessary patch without delay.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Utt 810g Firmware Vulnerabilities

View all Utt 810g Firmware vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.