Multiple Buffer Overflow Vulnerabilities in Milesight UR32L by Milesight
CVE-2023-25085

7.2HIGH

Key Information:

Vendor

Milesight

Status
Vendor
CVE Published:
6 July 2023

What is CVE-2023-25085?

The Milesight UR32L device version v32.3.0.5 contains multiple buffer overflow vulnerabilities in the vtysh_ubus binary. These vulnerabilities arise from the unsafe use of the sprintf function, allowing specially crafted HTTP requests to trigger arbitrary code execution. An attacker with elevated privileges can exploit these buffer overflows by manipulating the firewall_handler_set function, particularly through the index and to_dst variables, leading to potentially severe security breaches.

Affected Version(s)

UR32L v32.3.0.5

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Discovered by Francesco Benvenuto of Cisco Talos.
.