Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-34426: CWE-121: Stack-based Buffer Overflow in Yifan YF325

0
Critical
VulnerabilityCVE-2023-34426cvecve-2023-34426cwe-121
Published: Wed Oct 11 2023 (10/11/2023, 15:14:29 UTC)
Source: CVE Database V5
Vendor/Project: Yifan
Product: YF325

Description

A stack-based buffer overflow vulnerability exists in the httpd manage_request functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to stack-based buffer overflow. An attacker can send a network request to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 20:20:52 UTC

Technical Analysis

CVE-2023-34426 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the httpd manage_request functionality of the Yifan YF325 device running firmware version v1.0_20221108. The vulnerability arises when the device processes a specially crafted network request, which overflows a stack buffer due to improper bounds checking or input validation. This overflow can corrupt the stack, potentially allowing an attacker to execute arbitrary code, crash the device, or cause denial of service. The vulnerability is remotely exploitable over the network without any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 score of 9.8 indicates critical severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact covers confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker could fully compromise the device. The Yifan YF325 is an embedded device likely used in industrial or IoT contexts, where the httpd service manages network requests. No patches or public exploits are currently reported, but the vulnerability’s nature suggests it could be weaponized quickly. The lack of patch links indicates that users must rely on vendor communication or mitigations until a fix is released. This vulnerability is critical due to the combination of ease of exploitation, remote access, and potential for full system compromise.

Potential Impact

For European organizations, the impact of CVE-2023-34426 can be severe, especially for those deploying Yifan YF325 devices in critical infrastructure, industrial control systems, or IoT environments. Successful exploitation could lead to unauthorized remote code execution, allowing attackers to take full control of affected devices. This can result in data breaches, manipulation or disruption of operational processes, and denial of service conditions. Given the device’s likely role in network management or industrial applications, such compromise could cascade into broader network infiltration or operational downtime. The vulnerability’s remote and unauthenticated nature increases the risk of widespread exploitation, potentially affecting supply chains or service availability. European entities in sectors such as manufacturing, energy, transportation, and telecommunications that utilize embedded devices from Yifan or similar vendors are particularly at risk. The absence of known exploits currently provides a window for proactive defense, but the critical severity demands urgent attention to prevent future attacks.

Mitigation Recommendations

1. Immediately restrict network access to the Yifan YF325 management interface by implementing strict firewall rules and network segmentation to isolate the device from untrusted networks. 2. Monitor network traffic for unusual or malformed HTTP requests targeting the device’s httpd service, using intrusion detection systems or anomaly detection tools. 3. Engage with Yifan’s vendor support to obtain information on patches or firmware updates addressing this vulnerability and apply them as soon as they become available. 4. If patching is not immediately possible, consider deploying virtual patching techniques such as web application firewalls (WAFs) configured to block suspicious request patterns. 5. Conduct thorough asset inventories to identify all Yifan YF325 devices in the environment and assess their exposure. 6. Implement strict access controls and authentication mechanisms around device management interfaces, even if the vulnerability does not require authentication, to reduce attack surface. 7. Regularly update and harden device firmware and configurations to minimize other potential vulnerabilities. 8. Prepare incident response plans specific to embedded device compromise scenarios to enable rapid containment and recovery.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-06-12T17:08:42.225Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a53242a90255b94da6670

Added to database: 11/4/2025, 7:25:24 PM

Last enriched: 11/4/2025, 8:20:52 PM

Last updated: 2/7/2026, 6:19:55 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats