CVE-2026-7420
Received Received - Intake
Buffer Overflow in UTT HiPER 1250GW Firmware

Publication date: 2026-04-29

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. Impacted is the function strcpy of the file route/goform/ConfigAdvideo. The manipulation of the argument Profile results in buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-29
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
utt hiper_1250gw to 3.2.7-210907-180535 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-119 The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
CWE-120 The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a security flaw found in the UTT HiPER 1250GW device up to version 3.2.7-210907-180535. It exists in the strcpy function within the file route/goform/ConfigAdvideo. The flaw occurs when the argument 'Profile' is manipulated, causing a buffer overflow. This means that an attacker can send specially crafted input to overflow the buffer, potentially leading to unexpected behavior or control over the device.

The attack can be executed remotely, meaning an attacker does not need physical access to the device to exploit this vulnerability. Additionally, the exploit code has been publicly released, increasing the risk of attacks.


How can this vulnerability impact me? :

Exploiting this vulnerability can lead to a buffer overflow, which may allow an attacker to execute arbitrary code on the affected device. This can result in unauthorized access, disruption of service, or complete compromise of the device.

Since the attack can be performed remotely and the exploit is publicly available, the risk of exploitation is significant. This could lead to loss of data confidentiality, integrity, and availability.


Can you explain this vulnerability to me?

CVE-2026-7420 is a buffer overflow vulnerability found in the UTT HiPER 1250GW router firmware up to version 3.2.7-210907-180535. The flaw occurs in the /goform/ConfigAdvideo endpoint, specifically in the strcpy function when handling the Profile parameter. Because the input is not properly checked for length, an attacker can send an overly long value that causes memory to be overwritten beyond its intended boundary.

This vulnerability can be exploited remotely by sending a specially crafted POST request, which can lead to denial of service or potentially other malicious effects due to memory corruption.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing a remote attacker to cause a denial of service on the affected UTT HiPER 1250GW device. By exploiting the buffer overflow, the attacker can crash the device or disrupt its normal operation.

Additionally, because buffer overflows can sometimes be leveraged to execute arbitrary code, there is a potential risk of further compromise, although the primary documented impact is denial of service.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending a specially crafted POST request to the /goform/ConfigAdvideo endpoint of the UTT HiPER 1250GW router. The request should include an overly long parameter (such as "timestart" or "Profile") to test for buffer overflow conditions.

A proof-of-concept involves using a command-line tool like curl to send this malicious POST request and observe if the device crashes or behaves unexpectedly, indicating the presence of the vulnerability.

  • Example curl command to test the vulnerability: curl -X POST http://<target-ip>/goform/ConfigAdvideo -d "Profile=$(python3 -c 'print("A"*1000)')"
  • Monitor the device for crashes, reboots, or denial of service symptoms after sending the request.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable /goform/ConfigAdvideo endpoint by implementing network-level controls such as firewall rules or access control lists to limit who can send requests to the device.

Additionally, monitor network traffic for suspicious POST requests targeting this endpoint with unusually long parameters.

If possible, update the device firmware to a version that patches this vulnerability once available from the vendor.

Until a patch is applied, consider isolating the device from untrusted networks to reduce exposure.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart