CVE-2023-25112

CVSS 3.1 Score 7.2 of 10 (high)

Details

Published Jul 6, 2023
Updated: Aug 2, 2023
CWE ID 121
CWE ID 787

Summary

A vulnerability with the CVE ID CVE-2023-25112 has been identified in Milesight UR32L v32.3.0.5. The vulnerability is caused by multiple buffer overflow vulnerabilities in the vtysh_ubus binary, which uses an unsafe sprintf pattern. An attacker with high privileges can exploit this vulnerability by sending a specially crafted HTTP request, leading to arbitrary code execution. The affected product is tzul2N. The base severity of this vulnerability is rated as HIGH, with a base score of 7.2. It poses a potential danger to organizations as it allows an attacker to execute arbitrary code and can have a significant impact on integrity and confidentiality. Remediation for this vulnerability has not been provided in the information given.

Share

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-25112 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options