{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2846","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-20T07:59:46.096Z","datePublished":"2026-02-20T15:32:06.824Z","dateUpdated":"2026-02-24T14:30:51.460Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T10:31:29.564Z"},"title":"UTT HiPER 520 Web Management formPdbUpConfig sub_44D264 os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"UTT","product":"HiPER 520","versions":[{"version":"1.7.7-160105","status":"affected"}],"modules":["Web Management Interface"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in UTT HiPER 520 1.7.7-160105. This impacts the function sub_44D264 of the file /goform/formPdbUpConfig of the component Web Management Interface. The manipulation of the argument policyNames leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":7.2,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.2,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":8.3,"vectorString":"AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-20T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-20T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-20T09:05:20.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Ruler-Chovy (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.347082","name":"VDB-347082 | UTT HiPER 520 Web Management formPdbUpConfig sub_44D264 os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.347082","name":"VDB-347082 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.753964","name":"Submit #753964 | UTT HiPER 520 nv520v3v1.7.7-160105 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/cha0yang1/UTT520CVE/blob/main/UTTRCE1.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-24T14:30:31.963505Z","id":"CVE-2026-2846","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-24T14:30:51.460Z"}}]}}