CVE-2026-3016
Buffer Overflow in UTT HiPER 810G /goform/formP2PLimitConfig Allows Remote Exploitation
Publication date: 2026-02-23
Last updated on: 2026-02-24
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| utt | 810g_firmware | to 1.7.7-171114 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-119 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-3016 is a critical buffer overflow vulnerability found in the UTT HiPER 810G router firmware up to version 1.7.7-171114.'}, {'type': 'paragraph', 'content': 'The flaw occurs in the function strcpy within the file /goform/formP2PLimitConfig, specifically when handling the "except" argument.'}, {'type': 'paragraph', 'content': 'Because the input is copied without proper bounds checking, an attacker can cause a buffer overflow by sending a specially crafted request.'}, {'type': 'paragraph', 'content': 'This vulnerability can be exploited remotely without authentication, and a public proof-of-concept exploit is available.'}] [1, 3]
How can this vulnerability impact me? :
The buffer overflow vulnerability can allow remote attackers to execute denial of service attacks or potentially other malicious actions on the affected device.
It can impact the confidentiality, integrity, and availability of the UTT HiPER 810G router.
Since the exploit is publicly available and easy to execute, affected devices are at high risk if not patched or replaced.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': "This vulnerability can be detected by monitoring network traffic for requests sent to the endpoint /goform/formP2PLimitConfig on UTT HiPER 810G devices. Specifically, look for unusually large or malformed payloads targeting the 'except' argument that could trigger the buffer overflow."}, {'type': 'paragraph', 'content': 'Since the vulnerability involves a buffer overflow via the strcpy function in the /goform/formP2PLimitConfig endpoint, you can use network inspection tools like tcpdump or Wireshark to capture HTTP POST requests to this endpoint.'}, {'type': 'list_item', 'content': "Use tcpdump to capture traffic to the vulnerable endpoint: tcpdump -i <interface> -A 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep '/goform/formP2PLimitConfig'"}, {'type': 'list_item', 'content': 'Use curl or similar tools to test the endpoint manually by sending crafted requests and observing the device response.'}, {'type': 'paragraph', 'content': 'Note that no specific detection commands or signatures are provided in the available resources, so detection relies on monitoring access to the vulnerable endpoint and analyzing payload sizes and contents.'}] [1, 3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the vulnerable endpoint /goform/formP2PLimitConfig by implementing network-level controls such as firewall rules or access control lists to block unauthorized or external access.
Since no known countermeasures or patches are identified, it is recommended to replace the affected UTT HiPER 810G device or upgrade to a firmware version that is not vulnerable if available.
Additionally, monitor the device for unusual behavior or crashes that may indicate exploitation attempts.