Buffer Overflow Vulnerabilities in Milesight UR32L by Milesight
CVE-2023-25082

7.2HIGH

Key Information:

Vendor

Milesight

Status
Vendor
CVE Published:
6 July 2023

What is CVE-2023-25082?

Multiple buffer overflow vulnerabilities are present in the vtysh_ubus binary of the Milesight UR32L, particularly in version 32.3.0.5. These vulnerabilities stem from an unsafe sprintf pattern, which can be exploited through specially crafted HTTP requests. An attacker with elevated privileges may exploit these vulnerabilities to execute arbitrary code. Specifically, the affected function, firewall_handler_set, utilizes the old_ip and old_mac variables in a manner that creates exploitable conditions, allowing attackers to potentially gain control of the affected device.

Affected Version(s)

UR32L v32.3.0.5

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Discovered by Francesco Benvenuto of Cisco Talos.
.