CVE-2023-25115

CVSS 3.1 Score 7.2 of 10 (high)

Details

Published Jul 6, 2023
Updated: Aug 2, 2023
CWE ID 787
CWE ID 121

Summary

CVE-2023-25115 is a vulnerability that affects the Milesight UR32L v32.3.0.5 product. It is a buffer overflow vulnerability caused by the use of an unsafe sprintf pattern in the vtysh_ubus binary. This vulnerability can be exploited by sending a specially crafted HTTP request, which could lead to arbitrary code execution. The buffer overflow occurs in the set_openvpn_client function with the remote_ip and port variables. The severity of this vulnerability is rated as high, with a base score of 7.2 out of 10, and it poses a potential danger to organizations as it allows an attacker with high privileges to execute arbitrary code. Remediation for this vulnerability may require updating to a patched version of the affected product or implementing other security measures recommended by the vendor or security experts.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.

Share

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-25115 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options