CVE-2026-1140
Published: 19 January 2026
Description
A vulnerability was found in UTT 进取 520W 1.7.7-180627. This issue affects the function strcpy of the file /goform/ConfigExceptAli. The manipulation results in buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and…
more
could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires input validation and error handling at the vulnerable /goform/ConfigExceptAli endpoint, directly preventing buffer overflows from improper strcpy usage on untrusted inputs.
SI-16 enforces memory protections such as stack canaries, ASLR, and DEP, which mitigate exploitation of the buffer overflow even if invalid input reaches strcpy.
SI-2 mandates timely flaw remediation, including vulnerability scanning and patching or replacement of the affected router firmware to eliminate the unpatched buffer overflow.
Security SummaryAI
CVE-2026-1140 is a buffer overflow vulnerability in the UTT 进取 520W router firmware version 1.7.7-180627. The flaw affects the strcpy function in the file /goform/ConfigExceptAli, where improper input handling leads to a buffer overflow. Published on 2026-01-19, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-120 (Buffer Copy without Checking Size of Input).
An attacker with low privileges can exploit this remotely over the network with low attack complexity and no user interaction. Manipulation of the vulnerable endpoint triggers the buffer overflow, enabling high-impact consequences including unauthorized access to sensitive data, modification of system integrity, and denial of service, potentially leading to full compromise of the affected device.
Advisories from VulDB indicate the vendor was contacted early about the disclosure but provided no response, with no patches or official mitigations available. The exploit has been publicly disclosed, including in a GitHub repository, increasing the risk of active exploitation.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow in router firmware web endpoint enables remote exploitation by low-privileged attackers for RCE, directly facilitating privilege escalation (T1068) and public-facing application exploitation (T1190).