OS Command Injection Vulnerability in Milesight UR32L by Milesight
CVE-2023-24595

7.2HIGH

Key Information:

Vendor

Milesight

Status
Vendor
CVE Published:
6 July 2023

What is CVE-2023-24595?

An OS command injection vulnerability has been identified in the system_user_script functionality of the Milesight UR32L. This flaw allows malicious actors to execute arbitrary commands on the affected device through a series of specially crafted network requests. If exploited, this vulnerability poses significant risks to the integrity of the device and network security, as attackers can manipulate commands and gain unauthorized access.

Affected Version(s)

UR32L v32.3.0.5

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Discovered by Francesco Benvenuto of Cisco Talos.
.