CVE-2023-25114
- Reference to the description:
- Description:
- Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the expert_options variable.
- Last updated date:
- 08/02/2023
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 07/11/2023
- Reference url to background
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716