Home

Description

A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. Impacted is the function strcpy of the file route/goform/ConfigAdvideo. The manipulation of the argument Profile results in buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

PUBLISHED Reserved 2026-04-29 | Published 2026-04-29 | Updated 2026-04-30 | Assigner VulDB




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
HIGH: 8.8CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
9.0AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

Problem types

Buffer Overflow

Memory Corruption

Product status

3.2.7-210907-180535
affected

Timeline

2026-04-29:Advisory disclosed
2026-04-29:VulDB entry created
2026-04-29:VulDB entry last update

Credits

maple_s (VulDB User) reporter

References

vuldb.com/vuln/360157 (VDB-360157 | UTT HiPER 1250GW ConfigAdvideo strcpy buffer overflow) vdb-entry technical-description

vuldb.com/vuln/360157/cti (VDB-360157 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/submit/803997 (Submit #803997 | UTT HiPER 1250GW <=v3.2.7-210907-180535 Buffer Overflow) third-party-advisory

github.com/kirlic123/IOTvulner/blob/main/4035/5/5.md exploit

cve.org (CVE-2026-7420)

nvd.nist.gov (CVE-2026-7420)

Download JSON