Buffer Overflow Vulnerabilities in Milesight UR32L Firewall Functionality
CVE-2023-25081

7.2HIGH

Key Information:

Vendor

Milesight

Status
Vendor
CVE Published:
6 July 2023

What is CVE-2023-25081?

Multiple buffer overflow vulnerabilities have been identified in the vtysh_ubus binary of the Milesight UR32L system, primarily due to the handling of unsafe sprintf patterns. Attackers, particularly those with elevated privileges, can exploit these vulnerabilities by sending specially crafted HTTP requests. This exploits the firewall_handler_set function, affecting src and dmz variables, leading to the potential execution of arbitrary code. It is vital to patch affected versions to mitigate risks associated with these vulnerabilities.

Affected Version(s)

UR32L v32.3.0.5

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Discovered by Francesco Benvenuto of Cisco Talos.
.