CVE-2023-25092: CWE-121: Stack-based Buffer Overflow in Milesight UR32L
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the handle_interface_acl function with the interface and out_acl variables.
AI Analysis
Technical Summary
CVE-2023-25092 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the vtysh_ubus binary of the Milesight UR32L device firmware version 32.3.0.5. The vulnerability stems from the use of an unsafe sprintf pattern within the handle_interface_acl function, specifically involving the interface and out_acl variables. When a specially crafted HTTP request is sent to the device, it can overflow the stack buffer, enabling an attacker with high privileges to execute arbitrary code remotely. The attack vector requires network access to the device's HTTP management interface and elevated privileges, but does not require user interaction. The vulnerability affects confidentiality, integrity, and availability, as arbitrary code execution could lead to full device compromise, data leakage, or denial of service. Although no public exploits have been observed in the wild, the CVSS v3.1 score of 7.2 (high) reflects the significant risk posed by this flaw. The vulnerability is particularly critical for environments relying on Milesight UR32L devices for network routing or security functions, as exploitation could undermine network stability and security posture.
Potential Impact
For European organizations, exploitation of CVE-2023-25092 could lead to severe consequences including unauthorized control over network routing devices, potential interception or manipulation of network traffic, and disruption of critical services. This is especially concerning for sectors such as telecommunications, energy, transportation, and government agencies that may deploy Milesight UR32L devices in their infrastructure. Compromise of these devices could facilitate lateral movement within networks, data exfiltration, or sabotage of operational technology systems. The high privileges required to exploit this vulnerability somewhat limit the attack surface but do not eliminate risk, particularly if internal threat actors or attackers who have gained elevated access leverage this flaw. The absence of known exploits in the wild provides a window for proactive defense, but the potential impact on confidentiality, integrity, and availability remains substantial.
Mitigation Recommendations
1. Immediately restrict network access to the management HTTP interface of Milesight UR32L devices, limiting it to trusted administrative networks or VPNs. 2. Implement strict access controls and multi-factor authentication for administrative access to reduce the risk of privilege escalation. 3. Monitor network traffic for unusual or malformed HTTP requests targeting the device, especially those that could trigger the handle_interface_acl function. 4. Engage with Milesight support or vendors to obtain firmware updates or patches addressing this vulnerability; apply them promptly once available. 5. Conduct regular security audits and vulnerability scans on network devices to detect outdated firmware versions. 6. Employ network segmentation to isolate critical routing devices from general user networks, minimizing exposure. 7. Prepare incident response plans that include scenarios involving device compromise to ensure rapid containment and recovery.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2023-25092: CWE-121: Stack-based Buffer Overflow in Milesight UR32L
Description
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the handle_interface_acl function with the interface and out_acl variables.
AI-Powered Analysis
Technical Analysis
CVE-2023-25092 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the vtysh_ubus binary of the Milesight UR32L device firmware version 32.3.0.5. The vulnerability stems from the use of an unsafe sprintf pattern within the handle_interface_acl function, specifically involving the interface and out_acl variables. When a specially crafted HTTP request is sent to the device, it can overflow the stack buffer, enabling an attacker with high privileges to execute arbitrary code remotely. The attack vector requires network access to the device's HTTP management interface and elevated privileges, but does not require user interaction. The vulnerability affects confidentiality, integrity, and availability, as arbitrary code execution could lead to full device compromise, data leakage, or denial of service. Although no public exploits have been observed in the wild, the CVSS v3.1 score of 7.2 (high) reflects the significant risk posed by this flaw. The vulnerability is particularly critical for environments relying on Milesight UR32L devices for network routing or security functions, as exploitation could undermine network stability and security posture.
Potential Impact
For European organizations, exploitation of CVE-2023-25092 could lead to severe consequences including unauthorized control over network routing devices, potential interception or manipulation of network traffic, and disruption of critical services. This is especially concerning for sectors such as telecommunications, energy, transportation, and government agencies that may deploy Milesight UR32L devices in their infrastructure. Compromise of these devices could facilitate lateral movement within networks, data exfiltration, or sabotage of operational technology systems. The high privileges required to exploit this vulnerability somewhat limit the attack surface but do not eliminate risk, particularly if internal threat actors or attackers who have gained elevated access leverage this flaw. The absence of known exploits in the wild provides a window for proactive defense, but the potential impact on confidentiality, integrity, and availability remains substantial.
Mitigation Recommendations
1. Immediately restrict network access to the management HTTP interface of Milesight UR32L devices, limiting it to trusted administrative networks or VPNs. 2. Implement strict access controls and multi-factor authentication for administrative access to reduce the risk of privilege escalation. 3. Monitor network traffic for unusual or malformed HTTP requests targeting the device, especially those that could trigger the handle_interface_acl function. 4. Engage with Milesight support or vendors to obtain firmware updates or patches addressing this vulnerability; apply them promptly once available. 5. Conduct regular security audits and vulnerability scans on network devices to detect outdated firmware versions. 6. Employ network segmentation to isolate critical routing devices from general user networks, minimizing exposure. 7. Prepare incident response plans that include scenarios involving device compromise to ensure rapid containment and recovery.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-02-02T20:42:36.071Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a53172a90255b94da5e3d
Added to database: 11/4/2025, 7:25:11 PM
Last enriched: 11/4/2025, 9:06:17 PM
Last updated: 11/6/2025, 1:29:50 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-5651: Improper Control of Generation of Code ('Code Injection')
HighCVE-2024-57520: n/a
CriticalCVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.