CVE-2023-25122
CVSS V2 None
CVSS V3 None
Description
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the old_remote_subnet and the old_remote_mask variables.
Overview
- CVE ID
- CVE-2023-25122
- Assigner
- talos
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-07-06T14:53:26.927Z
- Last Modified Date
- 2023-07-17T19:35:23.969Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-25122 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25122 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 17:44:48 | Added to TrackCVE |