Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-31272: CWE-121: Stack-based Buffer Overflow in Yifan YF325

0
High
VulnerabilityCVE-2023-31272cvecve-2023-31272cwe-121
Published: Wed Oct 11 2023 (10/11/2023, 15:14:29 UTC)
Source: CVE Database V5
Vendor/Project: Yifan
Product: YF325

Description

A stack-based buffer overflow vulnerability exists in the httpd do_wds functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to stack-based buffer overflow. An attacker can send a network request to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 20:36:28 UTC

Technical Analysis

CVE-2023-31272 is a stack-based buffer overflow vulnerability identified in the httpd do_wds functionality of the Yifan YF325 device, specifically in version v1.0_20221108. The vulnerability arises when the device processes a specially crafted network request, which causes a buffer overflow on the stack. This type of vulnerability (CWE-121) can allow an attacker to overwrite the stack memory, potentially leading to arbitrary code execution, denial of service, or system compromise. The vulnerability is remotely exploitable over the network without requiring any privileges (AV:N/PR:N), but it requires user interaction in the form of the device receiving the malicious request (UI:R). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches or known exploits are currently available, which increases the urgency for defensive measures. The vulnerability affects a specific firmware version of the Yifan YF325, a device likely used in networking or IoT contexts. Attackers could leverage this flaw to gain control over the device, disrupt network operations, or pivot into internal networks.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to severe consequences including unauthorized access to sensitive data, disruption of network services, and potential lateral movement within corporate or critical infrastructure networks. Given the device’s role (likely networking or IoT), a successful attack could compromise network integrity and availability, impacting business continuity. Organizations relying on Yifan YF325 devices in their network infrastructure or industrial control systems could face operational outages or data breaches. The high CVSS score indicates that the vulnerability can be exploited remotely without authentication, increasing the risk of widespread attacks if the device is exposed to untrusted networks. This is particularly concerning for sectors such as telecommunications, manufacturing, and utilities in Europe, where such devices may be deployed. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the potential impact remains critical.

Mitigation Recommendations

1. Immediately identify and isolate all Yifan YF325 devices running the vulnerable firmware version v1.0_20221108 within the network. 2. Implement strict network segmentation to restrict access to these devices from untrusted or external networks. 3. Deploy firewall rules and intrusion prevention systems (IPS) to detect and block malformed or suspicious HTTP requests targeting the httpd do_wds functionality. 4. Monitor network traffic for unusual patterns or spikes in requests to the affected device, especially those resembling exploit attempts. 5. Engage with the vendor Yifan to obtain firmware updates or patches; if unavailable, consider device replacement or disabling vulnerable services where feasible. 6. Conduct regular vulnerability scans and penetration tests focusing on IoT and networking devices to detect similar issues. 7. Educate network administrators about the vulnerability and enforce strict access controls and logging on affected devices. 8. Prepare incident response plans specific to potential exploitation scenarios involving these devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-06-12T17:07:10.271Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a53202a90255b94da5ff0

Added to database: 11/4/2025, 7:25:20 PM

Last enriched: 11/4/2025, 8:36:28 PM

Last updated: 11/6/2025, 12:41:29 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats