Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-24582: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Milesight UR32L

0
High
VulnerabilityCVE-2023-24582cvecve-2023-24582cwe-77
Published: Thu Jul 06 2023 (07/06/2023, 14:53:29 UTC)
Source: CVE Database V5
Vendor/Project: Milesight
Product: UR32L

Description

Two OS command injection vulnerabilities exist in the urvpn_client cmd_name_action functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger these vulnerabilities.This OS command injection is triggered through a TCP packet.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:17:46 UTC

Technical Analysis

CVE-2023-24582 is an OS command injection vulnerability classified under CWE-77, found in the urvpn_client cmd_name_action functionality of the Milesight UR32L device, version v32.3.0.5. This vulnerability arises due to improper neutralization of special elements in system commands, allowing an attacker to inject arbitrary commands via a crafted TCP packet. The vulnerability is exploitable remotely over the network without requiring authentication, making it highly dangerous. When exploited, it enables an attacker to execute arbitrary OS commands with the privileges of the affected service, potentially leading to full system compromise. The vulnerability affects the device’s network-facing interface, increasing the attack surface. The CVSS v3.1 base score of 8.8 indicates high severity, with metrics AV:N (network attack vector), AC:L (low attack complexity), PR:N (no privileges required), UI:R (user interaction required, here interpreted as the device processing the network packet), and impacts on confidentiality, integrity, and availability all rated high. No patches or exploits in the wild have been reported yet, but the risk remains significant due to the nature of the vulnerability and the device’s deployment in network environments.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized remote code execution on Milesight UR32L devices, which are often used in industrial, network, and IoT environments. This could result in data breaches, disruption of network services, and potential lateral movement within corporate or critical infrastructure networks. The compromise of these devices could undermine network security, leading to loss of sensitive information, operational downtime, and damage to organizational reputation. Given the device’s role in network connectivity, attackers could leverage this vulnerability to establish persistent footholds or pivot to other systems. The high severity and network accessibility make this a critical risk for sectors such as manufacturing, utilities, transportation, and telecommunications across Europe.

Mitigation Recommendations

Organizations should immediately identify any Milesight UR32L devices running version v32.3.0.5 and isolate them from untrusted networks. Since no official patches are currently available, network-level mitigations such as firewall rules to restrict access to the device’s management interfaces should be implemented. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection for suspicious TCP packets targeting the urvpn_client functionality. Disable or restrict the vulnerable cmd_name_action functionality if possible. Monitor network traffic for unusual activity and establish strict network segmentation to limit exposure. Engage with the vendor for patch release timelines and apply updates promptly once available. Additionally, conduct regular vulnerability scans and penetration tests focusing on network-facing devices to detect similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-01-27T17:45:31.172Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a53132a90255b94da5768

Added to database: 11/4/2025, 7:25:07 PM

Last enriched: 11/4/2025, 9:17:46 PM

Last updated: 11/6/2025, 1:27:18 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats