Buffer Overflow Vulnerabilities in Milesight UR32L Firewall Software
CVE-2023-25084

7.2HIGH

Key Information:

Vendor

Milesight

Status
Vendor
CVE Published:
6 July 2023

What is CVE-2023-25084?

Multiple buffer overflow vulnerabilities affect the vtysh_ubus binary in Milesight UR32L v32.3.0.5 due to unsafe sprintf patterns. These vulnerabilities can be exploited via specially crafted HTTP requests, potentially allowing an attacker with elevated privileges to execute arbitrary code. The buffer overflow specifically occurs within the firewall_handler_set function, which handles variables such as IP, MAC, and description. This creates significant security risks for affected installations.

Affected Version(s)

UR32L v32.3.0.5

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Discovered by Francesco Benvenuto of Cisco Talos.
.