CVE-2026-2981
Published: 23 February 2026
Description
A vulnerability was found in UTT HiPER 810G up to 1.7.7-1711. The affected element is the function strcpy of the file /goform/formTaskEdit_ap. The manipulation of the argument txtMin2 results in buffer overflow. The attack may be launched remotely. The exploit…
more
has been made public and could be used.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the buffer overflow flaw in the strcpy function of /goform/formTaskEdit_ap by applying firmware patches or updates to UTT HiPER 810G.
Requires validation of the txtMin2 input argument to restrict size and prevent buffer overflow exploitation in the web form handler.
Implements memory protection mechanisms such as stack canaries, ASLR, and DEP to mitigate successful buffer overflow exploits even if input validation fails.
Security SummaryAI
CVE-2026-2981 is a buffer overflow vulnerability affecting UTT HiPER 810G firmware versions up to 1.7.7-1711. The issue stems from the strcpy function in the /goform/formTaskEdit_ap file, where manipulation of the txtMin2 argument leads to the overflow. It is associated with CWEs-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-120 (Buffer Copy without Checking Size of Input). The vulnerability was published on 2026-02-23 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
An attacker with low privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation enables high-impact consequences, including unauthorized access to sensitive data (high confidentiality impact), modification of system resources (high integrity impact), and disruption of services (high availability impact), potentially leading to full compromise of the affected device.
References point to a public proof-of-concept exploit available on GitHub (including a dedicated PoC section) and VulDB entries detailing the vulnerability (ctiid.347365, id.347365, submit.756131). The description confirms that the exploit has been made public and could be used, but no specific patches or mitigation steps from vendors are detailed in the provided information.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow in remotely accessible web form handler (/goform/) with PR:L to full device compromise directly enables exploitation of public-facing applications (T1190) and software vulnerability-based privilege escalation (T1068).