CVE-2023-25123
CVSS V2 None
CVSS V3 None
Description
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the remote_subnet and the remote_mask variables when action is 2.
Overview
- CVE ID
- CVE-2023-25123
- Assigner
- talos
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-07-06T14:53:27.013Z
- Last Modified Date
- 2023-07-17T19:35:24.087Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-25123 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25123 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 17:53:22 | Added to TrackCVE |