Vulnerability Description
A weakness has been identified in UTT 进取 521G 3.1.1-190816. Affected by this issue is the function doSystem of the file /goform/setSysAdm. Executing a manipulation of the argument passwd1 can lead to command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Utt | 521G Firmware | 3.1.1-190816 |
| Utt | 521G | 2.0 |
Related Weaknesses (CWE)
References
- https://github.com/cha0yang1/UTT521G/blob/main/RCE1.mdExploitThird Party Advisory
- https://github.com/cha0yang1/UTT521G/blob/main/RCE1.md#pocExploit
- https://vuldb.com/?ctiid.344885Permissions RequiredVDB Entry
- https://vuldb.com/?id.344885Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.749712Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-2182?
CVE-2026-2182 is a vulnerability with a CVSS score of 7.2 (HIGH). A weakness has been identified in UTT 进取 521G 3.1.1-190816. Affected by this issue is the function doSystem of the file /goform/setSysAdm. Executing a manipulation of the argument passwd1 can lead to ...
How severe is CVE-2026-2182?
CVE-2026-2182 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-2182?
Check the references section above for vendor advisories and patch information. Affected products include: Utt 521G Firmware, Utt 521G.