Vulnerabilities > CVE-2023-25117 - Stack-based Buffer Overflow vulnerability in Milesight Ur32L Firmware 32.3.0.5

047910
CVSS 7.2 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
HIGH
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
milesight
CWE-121

Summary

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the local_virtual_ip and the local_virtual_mask variables.

Vulnerable Configurations

Part Description Count
OS
Milesight
1
Hardware
Milesight
1

Common Weakness Enumeration (CWE)