Vulnerabilities > CVE-2023-25095 - Stack-based Buffer Overflow vulnerability in Milesight Ur32L Firmware 32.3.0.5

047910
CVSS 7.2 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
HIGH
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
milesight
CWE-121

Summary

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the rule_name variable with two possible format strings that represent negated commands.

Vulnerable Configurations

Part Description Count
OS
Milesight
1
Hardware
Milesight
1

Common Weakness Enumeration (CWE)