Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-25111: CWE-121: Stack-based Buffer Overflow in Milesight UR32L

0
High
VulnerabilityCVE-2023-25111cvecve-2023-25111cwe-121
Published: Thu Jul 06 2023 (07/06/2023, 14:53:25 UTC)
Source: CVE Database V5
Vendor/Project: Milesight
Product: UR32L

Description

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_gre function with the key variable.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:00:54 UTC

Technical Analysis

CVE-2023-25111 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the vtysh_ubus binary of the Milesight UR32L device firmware version 32.3.0.5. The root cause is the unsafe use of the sprintf function within the set_gre function, specifically involving the 'key' variable. This unsafe pattern allows an attacker with high privileges to craft malicious HTTP requests that overflow the buffer, potentially leading to arbitrary code execution on the device. The vulnerability requires the attacker to have high privileges, likely administrative access, but does not require user interaction. The CVSS v3.1 score is 7.2, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), privileges required high (PR:H), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). While no public exploits are currently known, the vulnerability could be leveraged to compromise device operation, intercept or manipulate network traffic, or disrupt services. The affected product, Milesight UR32L, is a network device commonly used in industrial and enterprise environments, making this vulnerability particularly concerning for organizations relying on these devices for critical network functions.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to severe consequences including unauthorized control over network devices, disruption of network services, and potential lateral movement within internal networks. The compromise of UR32L devices could expose sensitive data, degrade network integrity, and cause denial of service conditions. Given the device’s role in network infrastructure, successful exploitation could impact operational technology environments, industrial control systems, or enterprise network segments. The requirement for high privileges limits the attack surface but also indicates that insider threats or compromised administrative accounts could be leveraged. The impact is heightened in sectors such as manufacturing, energy, transportation, and critical infrastructure, where Milesight devices may be deployed. Additionally, disruption or manipulation of network traffic could have cascading effects on business continuity and regulatory compliance within the EU.

Mitigation Recommendations

1. Immediately restrict HTTP access to the vtysh_ubus interface to trusted administrators only, preferably via network segmentation or VPN access. 2. Implement strict access control and monitoring for administrative accounts to prevent privilege escalation or misuse. 3. Deploy network intrusion detection systems (NIDS) to monitor for anomalous or malformed HTTP requests targeting the set_gre function or related endpoints. 4. Regularly audit device firmware versions and configurations to identify and isolate vulnerable devices. 5. Engage with Milesight support to obtain patches or firmware updates addressing this vulnerability as soon as they become available. 6. If patches are not yet available, consider temporary mitigations such as disabling vulnerable services or applying firewall rules to block exploit attempts. 7. Conduct incident response preparedness focusing on detection and containment of potential exploitation attempts. 8. Educate network administrators on the risks and signs of exploitation related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-02-02T20:42:36.074Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a531b2a90255b94da5ea3

Added to database: 11/4/2025, 7:25:15 PM

Last enriched: 11/4/2025, 9:00:54 PM

Last updated: 11/6/2025, 1:23:26 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats