CVE-2023-25095: CWE-121: Stack-based Buffer Overflow in Milesight UR32L
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the rule_name variable with two possible format strings that represent negated commands.
AI Analysis
Technical Summary
CVE-2023-25095 is a stack-based buffer overflow vulnerability identified in the vtysh_ubus binary of the Milesight UR32L device firmware version 32.3.0.5. The root cause is the unsafe use of the sprintf function in the set_qos function, where the rule_name variable is processed with two specific format strings representing negated commands. This unsafe pattern allows an attacker with high privileges to craft malicious HTTP requests that overflow the stack buffer, leading to arbitrary code execution. The vulnerability is classified under CWE-121 (stack-based buffer overflow), which typically allows attackers to overwrite return addresses or function pointers, thereby hijacking control flow. The CVSS v3.1 score is 7.2, indicating high severity, with attack vector being network-based (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported, the vulnerability's characteristics suggest it could be exploited in targeted attacks, especially in environments where attackers have elevated access. The lack of available patches at the time of reporting increases the urgency for mitigation. The vulnerability affects a specific firmware version, so organizations must verify their device versions and take appropriate action.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Milesight UR32L devices in their network infrastructure, such as industrial control systems, IoT deployments, or critical communication networks. Exploitation can lead to full compromise of the affected device, allowing attackers to execute arbitrary code, potentially pivot within the network, disrupt services, or exfiltrate sensitive data. Given the device’s role in network management and control, this could result in degraded network performance, denial of service, or unauthorized access to internal systems. The requirement for high privileges to exploit somewhat limits the attack surface but does not eliminate risk, as insider threats or compromised administrative accounts could be leveraged. The absence of public exploits reduces immediate widespread risk but does not preclude targeted attacks. Organizations in sectors such as manufacturing, energy, transportation, and telecommunications are particularly vulnerable due to their reliance on such devices for operational continuity.
Mitigation Recommendations
1. Immediate inventory and identification of all Milesight UR32L devices running firmware version 32.3.0.5 within the network. 2. Contact Milesight for official patches or firmware updates addressing CVE-2023-25095 and apply them as soon as they become available. 3. Restrict administrative access to the devices to trusted personnel only, enforcing strong authentication and network segmentation to limit exposure. 4. Implement strict network-level controls to limit HTTP access to the vtysh_ubus interface, ideally isolating management interfaces from general network traffic. 5. Monitor device logs and network traffic for unusual HTTP requests or signs of exploitation attempts targeting the set_qos function or related endpoints. 6. Employ intrusion detection/prevention systems with updated signatures to detect attempts to exploit this vulnerability. 7. Conduct regular security audits and penetration tests focusing on device firmware vulnerabilities and privilege escalation paths. 8. Develop incident response plans specific to device compromise scenarios to minimize impact if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Czech Republic
CVE-2023-25095: CWE-121: Stack-based Buffer Overflow in Milesight UR32L
Description
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the rule_name variable with two possible format strings that represent negated commands.
AI-Powered Analysis
Technical Analysis
CVE-2023-25095 is a stack-based buffer overflow vulnerability identified in the vtysh_ubus binary of the Milesight UR32L device firmware version 32.3.0.5. The root cause is the unsafe use of the sprintf function in the set_qos function, where the rule_name variable is processed with two specific format strings representing negated commands. This unsafe pattern allows an attacker with high privileges to craft malicious HTTP requests that overflow the stack buffer, leading to arbitrary code execution. The vulnerability is classified under CWE-121 (stack-based buffer overflow), which typically allows attackers to overwrite return addresses or function pointers, thereby hijacking control flow. The CVSS v3.1 score is 7.2, indicating high severity, with attack vector being network-based (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported, the vulnerability's characteristics suggest it could be exploited in targeted attacks, especially in environments where attackers have elevated access. The lack of available patches at the time of reporting increases the urgency for mitigation. The vulnerability affects a specific firmware version, so organizations must verify their device versions and take appropriate action.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Milesight UR32L devices in their network infrastructure, such as industrial control systems, IoT deployments, or critical communication networks. Exploitation can lead to full compromise of the affected device, allowing attackers to execute arbitrary code, potentially pivot within the network, disrupt services, or exfiltrate sensitive data. Given the device’s role in network management and control, this could result in degraded network performance, denial of service, or unauthorized access to internal systems. The requirement for high privileges to exploit somewhat limits the attack surface but does not eliminate risk, as insider threats or compromised administrative accounts could be leveraged. The absence of public exploits reduces immediate widespread risk but does not preclude targeted attacks. Organizations in sectors such as manufacturing, energy, transportation, and telecommunications are particularly vulnerable due to their reliance on such devices for operational continuity.
Mitigation Recommendations
1. Immediate inventory and identification of all Milesight UR32L devices running firmware version 32.3.0.5 within the network. 2. Contact Milesight for official patches or firmware updates addressing CVE-2023-25095 and apply them as soon as they become available. 3. Restrict administrative access to the devices to trusted personnel only, enforcing strong authentication and network segmentation to limit exposure. 4. Implement strict network-level controls to limit HTTP access to the vtysh_ubus interface, ideally isolating management interfaces from general network traffic. 5. Monitor device logs and network traffic for unusual HTTP requests or signs of exploitation attempts targeting the set_qos function or related endpoints. 6. Employ intrusion detection/prevention systems with updated signatures to detect attempts to exploit this vulnerability. 7. Conduct regular security audits and penetration tests focusing on device firmware vulnerabilities and privilege escalation paths. 8. Develop incident response plans specific to device compromise scenarios to minimize impact if exploitation occurs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-02-02T20:42:36.071Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a53172a90255b94da5e49
Added to database: 11/4/2025, 7:25:11 PM
Last enriched: 11/4/2025, 9:05:30 PM
Last updated: 11/6/2025, 1:38:36 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-5651: Improper Control of Generation of Code ('Code Injection')
HighCVE-2024-57520: n/a
CriticalCVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.