CVE-2023-25111: CWE-121: Stack-based Buffer Overflow in Milesight UR32L
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_gre function with the key variable.
AI Analysis
Technical Summary
CVE-2023-25111 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the vtysh_ubus binary of the Milesight UR32L device firmware version 32.3.0.5. The root cause is the unsafe use of the sprintf function within the set_gre function, specifically involving the 'key' variable. This unsafe pattern allows an attacker with high privileges to craft malicious HTTP requests that overflow the buffer, potentially leading to arbitrary code execution on the device. The vulnerability requires the attacker to have high privileges, likely administrative access, but does not require user interaction. The CVSS v3.1 score is 7.2, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), privileges required high (PR:H), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). While no public exploits are currently known, the vulnerability could be leveraged to compromise device operation, intercept or manipulate network traffic, or disrupt services. The affected product, Milesight UR32L, is a network device commonly used in industrial and enterprise environments, making this vulnerability particularly concerning for organizations relying on these devices for critical network functions.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to severe consequences including unauthorized control over network devices, disruption of network services, and potential lateral movement within internal networks. The compromise of UR32L devices could expose sensitive data, degrade network integrity, and cause denial of service conditions. Given the device’s role in network infrastructure, successful exploitation could impact operational technology environments, industrial control systems, or enterprise network segments. The requirement for high privileges limits the attack surface but also indicates that insider threats or compromised administrative accounts could be leveraged. The impact is heightened in sectors such as manufacturing, energy, transportation, and critical infrastructure, where Milesight devices may be deployed. Additionally, disruption or manipulation of network traffic could have cascading effects on business continuity and regulatory compliance within the EU.
Mitigation Recommendations
1. Immediately restrict HTTP access to the vtysh_ubus interface to trusted administrators only, preferably via network segmentation or VPN access. 2. Implement strict access control and monitoring for administrative accounts to prevent privilege escalation or misuse. 3. Deploy network intrusion detection systems (NIDS) to monitor for anomalous or malformed HTTP requests targeting the set_gre function or related endpoints. 4. Regularly audit device firmware versions and configurations to identify and isolate vulnerable devices. 5. Engage with Milesight support to obtain patches or firmware updates addressing this vulnerability as soon as they become available. 6. If patches are not yet available, consider temporary mitigations such as disabling vulnerable services or applying firewall rules to block exploit attempts. 7. Conduct incident response preparedness focusing on detection and containment of potential exploitation attempts. 8. Educate network administrators on the risks and signs of exploitation related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Czech Republic
CVE-2023-25111: CWE-121: Stack-based Buffer Overflow in Milesight UR32L
Description
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_gre function with the key variable.
AI-Powered Analysis
Technical Analysis
CVE-2023-25111 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the vtysh_ubus binary of the Milesight UR32L device firmware version 32.3.0.5. The root cause is the unsafe use of the sprintf function within the set_gre function, specifically involving the 'key' variable. This unsafe pattern allows an attacker with high privileges to craft malicious HTTP requests that overflow the buffer, potentially leading to arbitrary code execution on the device. The vulnerability requires the attacker to have high privileges, likely administrative access, but does not require user interaction. The CVSS v3.1 score is 7.2, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), privileges required high (PR:H), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). While no public exploits are currently known, the vulnerability could be leveraged to compromise device operation, intercept or manipulate network traffic, or disrupt services. The affected product, Milesight UR32L, is a network device commonly used in industrial and enterprise environments, making this vulnerability particularly concerning for organizations relying on these devices for critical network functions.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to severe consequences including unauthorized control over network devices, disruption of network services, and potential lateral movement within internal networks. The compromise of UR32L devices could expose sensitive data, degrade network integrity, and cause denial of service conditions. Given the device’s role in network infrastructure, successful exploitation could impact operational technology environments, industrial control systems, or enterprise network segments. The requirement for high privileges limits the attack surface but also indicates that insider threats or compromised administrative accounts could be leveraged. The impact is heightened in sectors such as manufacturing, energy, transportation, and critical infrastructure, where Milesight devices may be deployed. Additionally, disruption or manipulation of network traffic could have cascading effects on business continuity and regulatory compliance within the EU.
Mitigation Recommendations
1. Immediately restrict HTTP access to the vtysh_ubus interface to trusted administrators only, preferably via network segmentation or VPN access. 2. Implement strict access control and monitoring for administrative accounts to prevent privilege escalation or misuse. 3. Deploy network intrusion detection systems (NIDS) to monitor for anomalous or malformed HTTP requests targeting the set_gre function or related endpoints. 4. Regularly audit device firmware versions and configurations to identify and isolate vulnerable devices. 5. Engage with Milesight support to obtain patches or firmware updates addressing this vulnerability as soon as they become available. 6. If patches are not yet available, consider temporary mitigations such as disabling vulnerable services or applying firewall rules to block exploit attempts. 7. Conduct incident response preparedness focusing on detection and containment of potential exploitation attempts. 8. Educate network administrators on the risks and signs of exploitation related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-02-02T20:42:36.074Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a531b2a90255b94da5ea3
Added to database: 11/4/2025, 7:25:15 PM
Last enriched: 11/4/2025, 9:00:54 PM
Last updated: 11/6/2025, 1:23:26 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-5651: Improper Control of Generation of Code ('Code Injection')
HighCVE-2024-57520: n/a
CriticalCVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.