CVE-2023-25102
CVSS V2 None
CVSS V3 None
Description
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_dmvpn function with the hub_ip and the hub_gre_ip variables.
Overview
- CVE ID
- CVE-2023-25102
- Assigner
- talos
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-07-06T14:53:25.150Z
- Last Modified Date
- 2023-07-17T19:35:21.517Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-25102 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25102 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 17:57:12 | Added to TrackCVE |