CVSS 3.1 Score 7.2 of 10 (high)


Published Jul 6, 2023
Updated: Aug 2, 2023
CWE ID 787
CWE ID 121


CVE-2023-25114 is a vulnerability that affects the Milesight UR32L v32.3.0.5. It is categorized as a buffer overflow vulnerability and arises due to the use of an unsafe sprintf pattern in the vtysh_ubus binary. This vulnerability can be exploited by an attacker with high privileges who sends a specially crafted HTTP request, leading to arbitrary code execution. The buffer overflow occurs in the set_openvpn_client function with the expert_options variable. The base severity of this vulnerability is rated as HIGH, with a base score of 7.2, and it poses a significant danger to organizations as it can result in the compromise of confidentiality and integrity of their systems. To remediate this vulnerability, users should update to a newer version that addresses these buffer overflow issues.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-25114 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options