CVE-2023-25113: CWE-121: Stack-based Buffer Overflow in Milesight UR32L
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_l2tp function with the key variable.
AI Analysis
Technical Summary
CVE-2023-25113 is a stack-based buffer overflow vulnerability classified under CWE-121 found in the vtysh_ubus binary of the Milesight UR32L router, specifically version 32.3.0.5. The root cause is the unsafe use of the sprintf function in the set_l2tp function, where the key variable is not properly bounds-checked before being copied into a fixed-size buffer. This allows an attacker with high privileges to craft a malicious HTTP request that overflows the buffer, overwriting adjacent memory on the stack. The overflow can corrupt control flow data, enabling arbitrary code execution with the privileges of the vulnerable process. The vulnerability requires the attacker to have high privileges, such as administrative access to the device’s management interface, but does not require user interaction. The attack vector is network-based via HTTP requests, making remote exploitation feasible if the attacker can reach the management interface. The CVSS v3.1 base score is 7.2, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. No public exploits or patches are currently known, but the vulnerability poses a significant risk to the security of affected devices. The vulnerability could be leveraged to take full control of the device, disrupt network operations, or pivot into internal networks.
Potential Impact
For European organizations, the impact of CVE-2023-25113 is substantial, especially for those relying on Milesight UR32L routers in critical network infrastructure, such as telecommunications providers, industrial control systems, and enterprise networks. Exploitation could lead to full compromise of the affected device, allowing attackers to intercept, modify, or disrupt network traffic, potentially causing data breaches, service outages, or lateral movement within the network. This could affect confidentiality by exposing sensitive communications, integrity by allowing manipulation of network configurations or data, and availability by causing device crashes or denial of service. Given the network-facing nature of the vulnerability, attackers with administrative access could remotely exploit the flaw to gain persistent control. The lack of patches increases the urgency for organizations to implement compensating controls. The vulnerability also raises concerns for compliance with European data protection regulations, as exploitation could lead to unauthorized data access or service disruptions.
Mitigation Recommendations
1. Immediately restrict access to the management interface of Milesight UR32L devices to trusted networks and administrators only, using network segmentation and firewall rules. 2. Enforce strong authentication and limit administrative privileges to reduce the risk of high-privilege attackers gaining access. 3. Monitor network traffic for unusual or malformed HTTP requests targeting the vtysh_ubus interface, which could indicate exploitation attempts. 4. Disable or restrict the use of the L2TP configuration interface if not required, reducing the attack surface. 5. Regularly audit device configurations and logs for signs of compromise or anomalous activity. 6. Engage with the vendor for updates and apply security patches as soon as they become available. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once they are released. 8. Implement network-level protections such as VPNs or IP whitelisting to limit exposure of management interfaces. 9. Educate administrators about the risks of high-privilege access and the importance of secure management practices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2023-25113: CWE-121: Stack-based Buffer Overflow in Milesight UR32L
Description
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_l2tp function with the key variable.
AI-Powered Analysis
Technical Analysis
CVE-2023-25113 is a stack-based buffer overflow vulnerability classified under CWE-121 found in the vtysh_ubus binary of the Milesight UR32L router, specifically version 32.3.0.5. The root cause is the unsafe use of the sprintf function in the set_l2tp function, where the key variable is not properly bounds-checked before being copied into a fixed-size buffer. This allows an attacker with high privileges to craft a malicious HTTP request that overflows the buffer, overwriting adjacent memory on the stack. The overflow can corrupt control flow data, enabling arbitrary code execution with the privileges of the vulnerable process. The vulnerability requires the attacker to have high privileges, such as administrative access to the device’s management interface, but does not require user interaction. The attack vector is network-based via HTTP requests, making remote exploitation feasible if the attacker can reach the management interface. The CVSS v3.1 base score is 7.2, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. No public exploits or patches are currently known, but the vulnerability poses a significant risk to the security of affected devices. The vulnerability could be leveraged to take full control of the device, disrupt network operations, or pivot into internal networks.
Potential Impact
For European organizations, the impact of CVE-2023-25113 is substantial, especially for those relying on Milesight UR32L routers in critical network infrastructure, such as telecommunications providers, industrial control systems, and enterprise networks. Exploitation could lead to full compromise of the affected device, allowing attackers to intercept, modify, or disrupt network traffic, potentially causing data breaches, service outages, or lateral movement within the network. This could affect confidentiality by exposing sensitive communications, integrity by allowing manipulation of network configurations or data, and availability by causing device crashes or denial of service. Given the network-facing nature of the vulnerability, attackers with administrative access could remotely exploit the flaw to gain persistent control. The lack of patches increases the urgency for organizations to implement compensating controls. The vulnerability also raises concerns for compliance with European data protection regulations, as exploitation could lead to unauthorized data access or service disruptions.
Mitigation Recommendations
1. Immediately restrict access to the management interface of Milesight UR32L devices to trusted networks and administrators only, using network segmentation and firewall rules. 2. Enforce strong authentication and limit administrative privileges to reduce the risk of high-privilege attackers gaining access. 3. Monitor network traffic for unusual or malformed HTTP requests targeting the vtysh_ubus interface, which could indicate exploitation attempts. 4. Disable or restrict the use of the L2TP configuration interface if not required, reducing the attack surface. 5. Regularly audit device configurations and logs for signs of compromise or anomalous activity. 6. Engage with the vendor for updates and apply security patches as soon as they become available. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once they are released. 8. Implement network-level protections such as VPNs or IP whitelisting to limit exposure of management interfaces. 9. Educate administrators about the risks of high-privilege access and the importance of secure management practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-02-02T20:42:36.074Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a531b2a90255b94da5eab
Added to database: 11/4/2025, 7:25:15 PM
Last enriched: 11/4/2025, 9:00:27 PM
Last updated: 11/6/2025, 1:34:39 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-5651: Improper Control of Generation of Code ('Code Injection')
HighCVE-2024-57520: n/a
CriticalCVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.