CVE-2023-35055: CWE-121: Stack-based Buffer Overflow in Yifan YF325
A buffer overflow vulnerability exists in the httpd next_page functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.This buffer overflow is in the next_page parameter in the gozila_cgi function.
AI Analysis
Technical Summary
CVE-2023-35055 identifies a stack-based buffer overflow vulnerability in the Yifan YF325 device, version v1.0_20221108. The flaw resides in the httpd server component, specifically within the next_page parameter processed by the gozila_cgi function. When a specially crafted network request is sent to this parameter, it causes a buffer overflow on the stack, which can overwrite control data and lead to arbitrary command execution on the device. The vulnerability does not require prior authentication but does require user interaction, likely meaning the attacker must send the malicious request to the device's exposed network interface. The CVSS 3.1 score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with network attack vector and low attack complexity. The vulnerability is categorized under CWE-121, indicating classic stack-based buffer overflow issues. No patches or known exploits are currently published, but the potential for remote code execution makes this a critical threat. The device's httpd service is the attack surface, and exploitation could allow attackers to take full control of the device, disrupt services, or pivot into internal networks.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those deploying Yifan YF325 devices in critical infrastructure, industrial control systems, or network edge environments. Successful exploitation could lead to full device compromise, enabling attackers to execute arbitrary commands, disrupt device functionality, exfiltrate sensitive data, or use the device as a foothold for lateral movement within the network. This could impact confidentiality by exposing sensitive information, integrity by allowing unauthorized changes, and availability by causing denial of service. The lack of authentication requirement increases the attack surface, particularly if devices are exposed to untrusted networks or the internet. The requirement for user interaction may limit automated exploitation but does not eliminate risk in environments where attackers can send crafted requests directly. The absence of known exploits in the wild provides a window for proactive defense, but the high CVSS score demands urgent attention.
Mitigation Recommendations
European organizations should immediately implement network segmentation and restrict access to Yifan YF325 devices, ensuring they are not exposed to untrusted networks or the internet. Deploy strict firewall rules to limit incoming traffic to trusted sources only. Monitor network traffic for unusual or malformed requests targeting the httpd service, especially those involving the next_page parameter. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect potential exploitation attempts. Engage with the vendor to obtain patches or firmware updates as soon as they become available and plan for timely deployment. If patching is delayed, consider disabling or restricting the vulnerable httpd service or isolating affected devices. Conduct regular vulnerability scans and penetration tests focusing on this device to identify exposure. Educate network administrators about the threat and ensure incident response plans include scenarios involving device compromise through this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2023-35055: CWE-121: Stack-based Buffer Overflow in Yifan YF325
Description
A buffer overflow vulnerability exists in the httpd next_page functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.This buffer overflow is in the next_page parameter in the gozila_cgi function.
AI-Powered Analysis
Technical Analysis
CVE-2023-35055 identifies a stack-based buffer overflow vulnerability in the Yifan YF325 device, version v1.0_20221108. The flaw resides in the httpd server component, specifically within the next_page parameter processed by the gozila_cgi function. When a specially crafted network request is sent to this parameter, it causes a buffer overflow on the stack, which can overwrite control data and lead to arbitrary command execution on the device. The vulnerability does not require prior authentication but does require user interaction, likely meaning the attacker must send the malicious request to the device's exposed network interface. The CVSS 3.1 score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with network attack vector and low attack complexity. The vulnerability is categorized under CWE-121, indicating classic stack-based buffer overflow issues. No patches or known exploits are currently published, but the potential for remote code execution makes this a critical threat. The device's httpd service is the attack surface, and exploitation could allow attackers to take full control of the device, disrupt services, or pivot into internal networks.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those deploying Yifan YF325 devices in critical infrastructure, industrial control systems, or network edge environments. Successful exploitation could lead to full device compromise, enabling attackers to execute arbitrary commands, disrupt device functionality, exfiltrate sensitive data, or use the device as a foothold for lateral movement within the network. This could impact confidentiality by exposing sensitive information, integrity by allowing unauthorized changes, and availability by causing denial of service. The lack of authentication requirement increases the attack surface, particularly if devices are exposed to untrusted networks or the internet. The requirement for user interaction may limit automated exploitation but does not eliminate risk in environments where attackers can send crafted requests directly. The absence of known exploits in the wild provides a window for proactive defense, but the high CVSS score demands urgent attention.
Mitigation Recommendations
European organizations should immediately implement network segmentation and restrict access to Yifan YF325 devices, ensuring they are not exposed to untrusted networks or the internet. Deploy strict firewall rules to limit incoming traffic to trusted sources only. Monitor network traffic for unusual or malformed requests targeting the httpd service, especially those involving the next_page parameter. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect potential exploitation attempts. Engage with the vendor to obtain patches or firmware updates as soon as they become available and plan for timely deployment. If patching is delayed, consider disabling or restricting the vulnerable httpd service or isolating affected devices. Conduct regular vulnerability scans and penetration tests focusing on this device to identify exposure. Educate network administrators about the threat and ensure incident response plans include scenarios involving device compromise through this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-06-12T15:52:42.060Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a53242a90255b94da6682
Added to database: 11/4/2025, 7:25:24 PM
Last enriched: 11/4/2025, 8:20:16 PM
Last updated: 2/7/2026, 9:38:39 AM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.