CVE-2023-25117: CWE-121: Stack-based Buffer Overflow in Milesight UR32L
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the local_virtual_ip and the local_virtual_mask variables.
AI Analysis
Technical Summary
CVE-2023-25117 is a stack-based buffer overflow vulnerability identified in the vtysh_ubus binary of the Milesight UR32L device firmware version 32.3.0.5. The vulnerability stems from unsafe usage of the sprintf function within the set_openvpn_client function, specifically when handling the local_virtual_ip and local_virtual_mask parameters. This unsafe coding practice allows an attacker with high privileges to craft malicious HTTP requests that overflow the stack buffer, potentially leading to arbitrary code execution on the device. The vulnerability requires that the attacker already has high privileges, implying some level of prior access or compromise. The flaw affects confidentiality, integrity, and availability since arbitrary code execution can lead to data leakage, device manipulation, or denial of service. The CVSS v3.1 score is 7.2 (high), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and full impact on confidentiality, integrity, and availability. Currently, there are no publicly known exploits in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-121 (stack-based buffer overflow), a common and dangerous software weakness. The affected product, Milesight UR32L, is a network device often used in industrial and enterprise environments for routing and VPN services. The vulnerability specifically impacts the OpenVPN client configuration functionality, which is critical for secure remote access. Exploitation could allow attackers to execute arbitrary code remotely, potentially compromising the device and the network it protects.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Milesight UR32L devices in their network infrastructure. Successful exploitation can lead to full compromise of the device, enabling attackers to intercept or manipulate sensitive communications, disrupt network availability, or pivot to other internal systems. Critical sectors such as energy, manufacturing, and telecommunications that use these devices for secure VPN connections are particularly vulnerable. The impact extends to confidentiality breaches, integrity violations through unauthorized configuration changes, and availability disruptions via device crashes or persistent compromise. Given the network-exposed attack vector and high privileges required, insider threats or attackers who have already breached perimeter defenses pose the greatest risk. The absence of known exploits in the wild reduces immediate risk but does not eliminate the urgency for mitigation, as public disclosure may prompt attackers to develop exploits. European organizations must consider the potential for targeted attacks against critical infrastructure and sensitive networks using these devices.
Mitigation Recommendations
1. Immediately restrict HTTP access to the vtysh_ubus interface by implementing strict firewall rules limiting access to trusted management IPs only. 2. Monitor network traffic for unusual or malformed HTTP requests targeting the OpenVPN client configuration endpoints to detect potential exploitation attempts. 3. Employ network segmentation to isolate Milesight UR32L devices from less trusted network zones and reduce attack surface. 4. Regularly audit device configurations and logs for signs of compromise or unauthorized changes. 5. Engage with the vendor to obtain and apply official patches or firmware updates addressing this vulnerability as soon as they become available. 6. If patching is delayed, consider disabling or restricting OpenVPN client configuration features temporarily if operationally feasible. 7. Implement multi-factor authentication and strong access controls to reduce the risk of high-privilege account compromise. 8. Conduct internal vulnerability assessments and penetration tests focusing on network devices to identify and remediate similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2023-25117: CWE-121: Stack-based Buffer Overflow in Milesight UR32L
Description
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the local_virtual_ip and the local_virtual_mask variables.
AI-Powered Analysis
Technical Analysis
CVE-2023-25117 is a stack-based buffer overflow vulnerability identified in the vtysh_ubus binary of the Milesight UR32L device firmware version 32.3.0.5. The vulnerability stems from unsafe usage of the sprintf function within the set_openvpn_client function, specifically when handling the local_virtual_ip and local_virtual_mask parameters. This unsafe coding practice allows an attacker with high privileges to craft malicious HTTP requests that overflow the stack buffer, potentially leading to arbitrary code execution on the device. The vulnerability requires that the attacker already has high privileges, implying some level of prior access or compromise. The flaw affects confidentiality, integrity, and availability since arbitrary code execution can lead to data leakage, device manipulation, or denial of service. The CVSS v3.1 score is 7.2 (high), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and full impact on confidentiality, integrity, and availability. Currently, there are no publicly known exploits in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-121 (stack-based buffer overflow), a common and dangerous software weakness. The affected product, Milesight UR32L, is a network device often used in industrial and enterprise environments for routing and VPN services. The vulnerability specifically impacts the OpenVPN client configuration functionality, which is critical for secure remote access. Exploitation could allow attackers to execute arbitrary code remotely, potentially compromising the device and the network it protects.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Milesight UR32L devices in their network infrastructure. Successful exploitation can lead to full compromise of the device, enabling attackers to intercept or manipulate sensitive communications, disrupt network availability, or pivot to other internal systems. Critical sectors such as energy, manufacturing, and telecommunications that use these devices for secure VPN connections are particularly vulnerable. The impact extends to confidentiality breaches, integrity violations through unauthorized configuration changes, and availability disruptions via device crashes or persistent compromise. Given the network-exposed attack vector and high privileges required, insider threats or attackers who have already breached perimeter defenses pose the greatest risk. The absence of known exploits in the wild reduces immediate risk but does not eliminate the urgency for mitigation, as public disclosure may prompt attackers to develop exploits. European organizations must consider the potential for targeted attacks against critical infrastructure and sensitive networks using these devices.
Mitigation Recommendations
1. Immediately restrict HTTP access to the vtysh_ubus interface by implementing strict firewall rules limiting access to trusted management IPs only. 2. Monitor network traffic for unusual or malformed HTTP requests targeting the OpenVPN client configuration endpoints to detect potential exploitation attempts. 3. Employ network segmentation to isolate Milesight UR32L devices from less trusted network zones and reduce attack surface. 4. Regularly audit device configurations and logs for signs of compromise or unauthorized changes. 5. Engage with the vendor to obtain and apply official patches or firmware updates addressing this vulnerability as soon as they become available. 6. If patching is delayed, consider disabling or restricting OpenVPN client configuration features temporarily if operationally feasible. 7. Implement multi-factor authentication and strong access controls to reduce the risk of high-privilege account compromise. 8. Conduct internal vulnerability assessments and penetration tests focusing on network devices to identify and remediate similar issues proactively.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-02-02T20:42:36.076Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a531b2a90255b94da5ebb
Added to database: 11/4/2025, 7:25:15 PM
Last enriched: 11/4/2025, 8:50:40 PM
Last updated: 11/6/2025, 1:33:35 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-5651: Improper Control of Generation of Code ('Code Injection')
HighCVE-2024-57520: n/a
CriticalCVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.