Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-24519: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Milesight UR32L

0
High
VulnerabilityCVE-2023-24519cvecve-2023-24519cwe-77
Published: Thu Jul 06 2023 (07/06/2023, 14:53:30 UTC)
Source: CVE Database V5
Vendor/Project: Milesight
Product: UR32L

Description

Two OS command injection vulnerability exist in the vtysh_ubus toolsh_excute.constprop.1 functionality of Milesight UR32L v32.3.0.5. A specially-crafted network request can lead to command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is in the ping tool utility.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:18:15 UTC

Technical Analysis

CVE-2023-24519 is an OS command injection vulnerability categorized under CWE-77, affecting the Milesight UR32L device version v32.3.0.5. The flaw resides in the vtysh_ubus toolsh_excute.constprop.1 functionality, specifically within the ping tool utility. This vulnerability allows an attacker to craft a malicious network request that triggers execution of arbitrary operating system commands on the device. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and only limited privileges (PR:L), with no user interaction needed (UI:N). The vulnerability impacts confidentiality, integrity, and availability (all rated high), making it possible for an attacker to take full control of the device, manipulate data, or disrupt network operations. The device is typically used in network routing and communication roles, making it a critical asset in enterprise and industrial environments. Although no known exploits are currently in the wild, the high CVSS score (8.8) reflects the severe potential impact. The lack of available patches at the time of reporting necessitates immediate risk mitigation through network segmentation and access controls. The vulnerability’s exploitation could facilitate lateral movement within networks or serve as a foothold for broader attacks.

Potential Impact

For European organizations, the exploitation of CVE-2023-24519 could lead to severe consequences including unauthorized control over network routing devices, data interception or manipulation, and denial of service conditions. Given the critical role of the Milesight UR32L in network infrastructure, successful exploitation could disrupt business operations, compromise sensitive data, and affect service availability. Industrial sectors relying on these devices for operational technology (OT) networks could face safety risks and regulatory non-compliance. The breach of network devices also increases the risk of further lateral attacks within corporate or governmental networks. The high severity and ease of exploitation mean that even attackers with limited privileges can cause significant damage, emphasizing the need for urgent attention in European contexts where these devices are deployed.

Mitigation Recommendations

1. Immediately restrict network access to the vulnerable UR32L devices by implementing strict firewall rules and network segmentation to limit exposure to trusted management networks only. 2. Monitor network traffic for unusual or malformed requests targeting the ping utility or vtysh_ubus service to detect potential exploitation attempts. 3. Disable or restrict access to the vulnerable ping tool functionality if possible, until a vendor patch is available. 4. Engage with the vendor for timely updates or patches and apply them as soon as they are released. 5. Conduct thorough audits of all Milesight UR32L devices in the environment to identify affected versions and prioritize remediation. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting command injection attempts targeting this vulnerability. 7. Train network administrators on the risks and signs of exploitation related to this vulnerability to improve incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-01-25T15:05:01.029Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a53132a90255b94da5760

Added to database: 11/4/2025, 7:25:07 PM

Last enriched: 11/4/2025, 9:18:15 PM

Last updated: 11/6/2025, 11:51:17 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats