CVE-2026-2904

UTT · HiPER 810G

A high-severity vulnerability has been identified in the UTT HiPER 810G networking device, which could lead to unauthorized access or device compromise.

Executive summary

The UTT HiPER 810G router contains a critical security flaw that could allow an attacker to compromise the network gateway, leading to traffic interception or internal network access.

Vulnerability

A vulnerability was determined in the firmware of the UTT HiPER 810G 1 device. While the exact technical vector is not disclosed, the high CVSS score suggests it may involve remote code execution or a significant authentication bypass in the device's management interface.

Business impact

A compromise of a core networking device like the HiPER 810G is catastrophic. An attacker could redirect network traffic, perform man-in-the-middle attacks, or use the device as a pivot point to attack internal servers. The CVSS score of 8.8 reflects the critical nature of this infrastructure risk.

Remediation

Immediate Action: Administrators should immediately install the latest firmware updates from UTT. If the device is end-of-life, it should be replaced with a supported model.

Proactive Monitoring: Monitor the device for unauthorized configuration changes, unusual outbound traffic, or failed login attempts to the management console.

Compensating Controls: Ensure the management interface of the router is not accessible from the public internet and is restricted to a dedicated management VLAN.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The CVSS score of 8.8 indicates a critical risk to network infrastructure. We recommend that organizations treat this as a top-priority remediation task and apply firmware updates during the next available maintenance window, or sooner if the device is internet-facing.