CVE-2023-25121: CWE-121: Stack-based Buffer Overflow in Milesight UR32L
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_ike_profile function with the secrets_local variable.
AI Analysis
Technical Summary
CVE-2023-25121 is a stack-based buffer overflow vulnerability identified in the Milesight UR32L device firmware version v32.3.0.5. The flaw exists in the vtysh_ubus binary, specifically within the set_ike_profile function, which improperly uses an unsafe sprintf pattern to handle the secrets_local variable. This unsafe coding practice leads to a buffer overflow when processing specially crafted HTTP requests. An attacker possessing high-level privileges on the device can exploit this vulnerability remotely by sending malicious HTTP requests, causing memory corruption that enables arbitrary code execution. The vulnerability is classified under CWE-121, indicating a classic stack-based buffer overflow. The CVSS v3.1 score is 7.2 (high), reflecting network attack vector, low attack complexity, required high privileges, no user interaction, and impacts on confidentiality, integrity, and availability. Although no public exploits have been observed in the wild, the nature of the vulnerability poses a significant risk to affected devices. The lack of available patches at the time of reporting increases the urgency for mitigation. This vulnerability could allow attackers to take full control of the device, potentially disrupting network operations or enabling further lateral movement within an organization’s infrastructure.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to severe consequences including unauthorized disclosure of sensitive information, manipulation or destruction of network configurations, and denial of service conditions on critical network devices. Since the affected product, Milesight UR32L, is a network device often used in industrial, enterprise, and critical infrastructure environments, successful exploitation could disrupt essential services and operations. The requirement for high privileges limits the attack surface somewhat, but insider threats or compromised administrative accounts could be leveraged to exploit this flaw. The ability to execute arbitrary code remotely could enable attackers to implant persistent malware, intercept or alter network traffic, or pivot to other systems within the network. This poses a significant risk to confidentiality, integrity, and availability of organizational assets, particularly in sectors such as manufacturing, energy, transportation, and telecommunications, which are vital to European economies and security.
Mitigation Recommendations
European organizations should immediately identify any Milesight UR32L devices running firmware version v32.3.0.5 and restrict administrative access to trusted personnel only. Network segmentation should be enforced to isolate these devices from untrusted networks and limit exposure to potential attackers. Employ strict access controls and multi-factor authentication for device management interfaces to reduce the risk of privilege escalation. Monitor network traffic for anomalous HTTP requests targeting the vtysh_ubus service. Since no official patches are currently available, consider deploying virtual patching via intrusion prevention systems (IPS) that can detect and block exploit attempts targeting this vulnerability. Regularly audit device firmware versions and update to newer, patched versions as soon as they become available from the vendor. Additionally, conduct thorough incident response preparedness to quickly detect and respond to any exploitation attempts. Engage with Milesight support channels to obtain updates and security advisories.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2023-25121: CWE-121: Stack-based Buffer Overflow in Milesight UR32L
Description
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_ike_profile function with the secrets_local variable.
AI-Powered Analysis
Technical Analysis
CVE-2023-25121 is a stack-based buffer overflow vulnerability identified in the Milesight UR32L device firmware version v32.3.0.5. The flaw exists in the vtysh_ubus binary, specifically within the set_ike_profile function, which improperly uses an unsafe sprintf pattern to handle the secrets_local variable. This unsafe coding practice leads to a buffer overflow when processing specially crafted HTTP requests. An attacker possessing high-level privileges on the device can exploit this vulnerability remotely by sending malicious HTTP requests, causing memory corruption that enables arbitrary code execution. The vulnerability is classified under CWE-121, indicating a classic stack-based buffer overflow. The CVSS v3.1 score is 7.2 (high), reflecting network attack vector, low attack complexity, required high privileges, no user interaction, and impacts on confidentiality, integrity, and availability. Although no public exploits have been observed in the wild, the nature of the vulnerability poses a significant risk to affected devices. The lack of available patches at the time of reporting increases the urgency for mitigation. This vulnerability could allow attackers to take full control of the device, potentially disrupting network operations or enabling further lateral movement within an organization’s infrastructure.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to severe consequences including unauthorized disclosure of sensitive information, manipulation or destruction of network configurations, and denial of service conditions on critical network devices. Since the affected product, Milesight UR32L, is a network device often used in industrial, enterprise, and critical infrastructure environments, successful exploitation could disrupt essential services and operations. The requirement for high privileges limits the attack surface somewhat, but insider threats or compromised administrative accounts could be leveraged to exploit this flaw. The ability to execute arbitrary code remotely could enable attackers to implant persistent malware, intercept or alter network traffic, or pivot to other systems within the network. This poses a significant risk to confidentiality, integrity, and availability of organizational assets, particularly in sectors such as manufacturing, energy, transportation, and telecommunications, which are vital to European economies and security.
Mitigation Recommendations
European organizations should immediately identify any Milesight UR32L devices running firmware version v32.3.0.5 and restrict administrative access to trusted personnel only. Network segmentation should be enforced to isolate these devices from untrusted networks and limit exposure to potential attackers. Employ strict access controls and multi-factor authentication for device management interfaces to reduce the risk of privilege escalation. Monitor network traffic for anomalous HTTP requests targeting the vtysh_ubus service. Since no official patches are currently available, consider deploying virtual patching via intrusion prevention systems (IPS) that can detect and block exploit attempts targeting this vulnerability. Regularly audit device firmware versions and update to newer, patched versions as soon as they become available from the vendor. Additionally, conduct thorough incident response preparedness to quickly detect and respond to any exploitation attempts. Engage with Milesight support channels to obtain updates and security advisories.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-02-02T20:42:36.078Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a531d2a90255b94da5f1a
Added to database: 11/4/2025, 7:25:17 PM
Last enriched: 11/4/2025, 8:49:35 PM
Last updated: 11/6/2025, 1:53:22 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-5651: Improper Control of Generation of Code ('Code Injection')
HighCVE-2024-57520: n/a
CriticalCVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.