CVE-2023-25089
CVSS 3.1 Score 7.2 of 10 (high)
Details
Published Jul 6, 2023
Updated: Aug 2, 2023
CWE ID 121
CWE ID 787
Summary
CVE-2023-25089 is a critical buffer overflow vulnerability affecting the vtysh_ubus binary in Milesight UR32L v32.3.0.5. The issue arises due to the use of an unsafe sprintf function, which can be exploited through a specially crafted HTTP request. An attacker with high privileges can leverage this weakness to execute arbitrary code. The buffer overflow vulnerability is specifically found in the handle_interface_acl function, where the interface variable is processed with an invalid input when in_acl holds the value of -1.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Share
Affected Vendors
- Milesight
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
Note: This is just a basic overview providing quick insights into CVE-2023-25089 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions