8
0
8
2
Vulnerability Timeline
8 vulnerabilities discovered over time for 810g firmware
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-3815 | 7.4 | An attacker can remotely exploit a vulnerability in the UTT HiPER 810G firmware to execute a buffer overflow, potentially allowing them to take control of the device. This issue affects versions up to 1.7.7-1711 and requires no special access, making it particularly dangerous. | utt810g firmware | Exploit Available | 29 days agoMar 9, 2026 |
| CVE-2026-3814 | 7.4 | An attacker can remotely exploit a buffer overflow vulnerability in the UTT HiPER 810G firmware, potentially allowing them to execute arbitrary code on the device. This issue affects versions up to 1.7.7-1711, and the exploit is publicly available, making it easier for attackers to launch an attack. | utt810g firmware | Exploit Available | 30 days agoMar 9, 2026 |
| CVE-2026-3016 | 7.4 | This vulnerability allows an attacker to remotely take control of the UTT HiPER 810G device by exploiting a flaw in how it handles data, potentially leading to unauthorized access or system crashes. The attacker can exploit this issue if they can send specially crafted data to the device, making it a serious risk for users running affected firmware versions. | utt810g firmware | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2026-3015 | 7.4 | An attacker can remotely exploit a flaw in the UTT HiPER 810G firmware to execute arbitrary code by manipulating a specific input, which can lead to a buffer overflow. This vulnerability affects versions up to 1.7.7-171114 and could allow the attacker to take control of the device if they can send a specially crafted request. | utt810g firmware | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2026-2981 | 7.4 | This vulnerability allows an attacker to remotely execute malicious code on UTT HiPER 810G devices by exploiting a buffer overflow in a specific function. It affects firmware versions up to 1.7.7-1711, and the attacker can manipulate input data to trigger the exploit. | utt810g firmware | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2026-2980 | 7.3 | An attacker can remotely exploit a vulnerability in UTT HiPER 810G firmware to execute arbitrary code by manipulating a password input, which causes a buffer overflow. This issue affects versions up to 1.7.7-1711 and could allow the attacker to take control of the device. | utt810g firmware | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2026-2935 | 7.3 | This vulnerability allows an attacker to remotely execute code on the UTT HiPER 810G firmware by exploiting a flaw in how the device handles certain input, potentially leading to a complete system compromise. The attacker needs to manipulate a specific argument in a configuration file, and public exploit code is already available, making it easier for malicious actors to take advantage of this weakness. | utt810g firmware | Exploit Available | about 1 month agoFeb 22, 2026 |
| CVE-2026-2904 | 7.4 | This vulnerability allows an attacker to remotely execute malicious code on the UTT HiPER 810G device by exploiting a flaw in its configuration file handling, which can lead to a buffer overflow. The attacker needs to manipulate specific input to trigger this issue, making it a serious risk for anyone using this firmware version. | utt810g firmware | Exploit Available | about 1 month agoFeb 22, 2026 |
About Utt 810g firmware Security
This page provides comprehensive security vulnerability tracking for Utt 810g firmware. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep 810g firmware updated to the latest version
- • Subscribe to security advisories from Utt
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately