CVE-2026-0839

A weakness has been identified in UTT 进取 520W 1.7.7-180627. Affected is the function strcpy of the file /goform/APSecurity. Executing a manipulation of the argument wepkey1 can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/GUOTINGTING2297/cve/blob/main/1234/29.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.340439 Permissions Required VDB Entry
https://vuldb.com/?id.340439 Third Party Advisory VDB Entry
https://vuldb.com/?submit.729028 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:utt:520w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:utt:520w:3.0:*:*:*:*:*:*:*

History

13 Jan 2026, 21:57

Type Values Removed Values Added
First Time Utt
Utt 520w Firmware
Utt 520w
CPE cpe:2.3:h:utt:520w:3.0:*:*:*:*:*:*:*
cpe:2.3:o:utt:520w_firmware:*:*:*:*:*:*:*:*
References () https://github.com/GUOTINGTING2297/cve/blob/main/1234/29.md - () https://github.com/GUOTINGTING2297/cve/blob/main/1234/29.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.340439 - () https://vuldb.com/?ctiid.340439 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.340439 - () https://vuldb.com/?id.340439 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.729028 - () https://vuldb.com/?submit.729028 - Third Party Advisory, VDB Entry

11 Jan 2026, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-11 06:15

Updated : 2026-01-13 21:57


NVD link : CVE-2026-0839

Mitre link : CVE-2026-0839

CVE.ORG link : CVE-2026-0839


JSON object : View

Products Affected

utt

  • 520w_firmware
  • 520w
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')