CVE-2026-1162

A flaw has been found in UTT HiPER 810 1.7.4-141218. The impacted element is the function strcpy of the file /goform/setSysAdm. This manipulation of the argument passwd1 causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.
References
Link Resource
https://github.com/cha0yang1/UTT810/blob/main/1.md Broken Link
https://github.com/cha0yang1/UTT810/blob/main/1.md#poc Broken Link
https://vuldb.com/?ctiid.341756 Permissions Required VDB Entry
https://vuldb.com/?id.341756 Third Party Advisory VDB Entry
https://vuldb.com/?submit.736511 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:utt:810_firmware:1.7.4-141218:*:*:*:*:*:*:*
cpe:2.3:h:utt:810:-:*:*:*:*:*:*:*

History

06 Feb 2026, 19:18

Type Values Removed Values Added
First Time Utt
Utt 810
Utt 810 Firmware
CPE cpe:2.3:o:utt:810_firmware:1.7.4-141218:*:*:*:*:*:*:*
cpe:2.3:h:utt:810:-:*:*:*:*:*:*:*
References () https://github.com/cha0yang1/UTT810/blob/main/1.md - () https://github.com/cha0yang1/UTT810/blob/main/1.md - Broken Link
References () https://github.com/cha0yang1/UTT810/blob/main/1.md#poc - () https://github.com/cha0yang1/UTT810/blob/main/1.md#poc - Broken Link
References () https://vuldb.com/?ctiid.341756 - () https://vuldb.com/?ctiid.341756 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.341756 - () https://vuldb.com/?id.341756 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.736511 - () https://vuldb.com/?submit.736511 - Third Party Advisory, VDB Entry

19 Jan 2026, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-19 17:15

Updated : 2026-02-06 19:18


NVD link : CVE-2026-1162

Mitre link : CVE-2026-1162

CVE.ORG link : CVE-2026-1162


JSON object : View

Products Affected

utt

  • 810
  • 810_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')