Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-25087: CWE-121: Stack-based Buffer Overflow in Milesight UR32L

0
High
VulnerabilityCVE-2023-25087cvecve-2023-25087cwe-121
Published: Thu Jul 06 2023 (07/06/2023, 14:53:23 UTC)
Source: CVE Database V5
Vendor/Project: Milesight
Product: UR32L

Description

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the index and to_dport variables.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:15:38 UTC

Technical Analysis

CVE-2023-25087 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the vtysh_ubus binary of the Milesight UR32L router firmware version 32.3.0.5. The root cause is the unsafe use of the sprintf function in the firewall_handler_set function, which processes the index and to_dport variables derived from HTTP requests. Because sprintf does not perform bounds checking, specially crafted HTTP requests with malicious payloads can overflow the buffer, corrupting the stack. This corruption can lead to arbitrary code execution, allowing an attacker with high privileges to potentially execute malicious code on the device. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but does require high privileges (PR:H) and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected device. Although no public exploits are known, the vulnerability's nature and CVSS score of 7.2 indicate a significant risk. The affected product, Milesight UR32L, is a network device commonly used in industrial and enterprise environments, making exploitation potentially impactful. The lack of available patches at the time of disclosure increases the urgency for mitigation.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to full compromise of affected Milesight UR32L devices, which may serve as critical network infrastructure components such as routers or firewalls. This could result in unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and potential pivoting to other internal systems. Industrial sectors and enterprises relying on these devices for secure communications and firewalling are particularly at risk. The confidentiality, integrity, and availability of network traffic and connected systems could be severely affected. Given the high privileges required to exploit the vulnerability, insider threats or attackers who have already gained elevated access could leverage this flaw to escalate control. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time.

Mitigation Recommendations

European organizations should immediately inventory their network infrastructure to identify any Milesight UR32L devices running version 32.3.0.5. Until a vendor patch is released, organizations should implement strict network segmentation and access controls to limit administrative access to these devices, ensuring only trusted personnel can send HTTP requests to the affected binary. Employ network-based intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect anomalous or malformed HTTP requests targeting the firewall_handler_set function. Disable or restrict remote management interfaces if not required, or enforce VPN and multi-factor authentication for administrative access. Monitor device logs for unusual activity indicative of exploitation attempts. Engage with the vendor for patch availability and apply updates promptly once released. Additionally, consider deploying endpoint detection and response (EDR) solutions on critical systems to detect lateral movement stemming from compromised network devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-02-02T20:42:36.069Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a53152a90255b94da57ab

Added to database: 11/4/2025, 7:25:09 PM

Last enriched: 11/4/2025, 9:15:38 PM

Last updated: 2/7/2026, 11:57:45 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats