CVE-2023-35055: CWE-121: Stack-based Buffer Overflow in Yifan YF325
A buffer overflow vulnerability exists in the httpd next_page functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.This buffer overflow is in the next_page parameter in the gozila_cgi function.
AI Analysis
Technical Summary
CVE-2023-35055 identifies a stack-based buffer overflow vulnerability in the Yifan YF325 device, version v1.0_20221108. The flaw resides in the httpd server component, specifically within the next_page parameter processed by the gozila_cgi function. When a specially crafted network request is sent to this parameter, it causes a buffer overflow on the stack, which can overwrite control data and lead to arbitrary command execution on the device. The vulnerability does not require prior authentication but does require user interaction, likely meaning the attacker must send the malicious request to the device's exposed network interface. The CVSS 3.1 score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with network attack vector and low attack complexity. The vulnerability is categorized under CWE-121, indicating classic stack-based buffer overflow issues. No patches or known exploits are currently published, but the potential for remote code execution makes this a critical threat. The device's httpd service is the attack surface, and exploitation could allow attackers to take full control of the device, disrupt services, or pivot into internal networks.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those deploying Yifan YF325 devices in critical infrastructure, industrial control systems, or network edge environments. Successful exploitation could lead to full device compromise, enabling attackers to execute arbitrary commands, disrupt device functionality, exfiltrate sensitive data, or use the device as a foothold for lateral movement within the network. This could impact confidentiality by exposing sensitive information, integrity by allowing unauthorized changes, and availability by causing denial of service. The lack of authentication requirement increases the attack surface, particularly if devices are exposed to untrusted networks or the internet. The requirement for user interaction may limit automated exploitation but does not eliminate risk in environments where attackers can send crafted requests directly. The absence of known exploits in the wild provides a window for proactive defense, but the high CVSS score demands urgent attention.
Mitigation Recommendations
European organizations should immediately implement network segmentation and restrict access to Yifan YF325 devices, ensuring they are not exposed to untrusted networks or the internet. Deploy strict firewall rules to limit incoming traffic to trusted sources only. Monitor network traffic for unusual or malformed requests targeting the httpd service, especially those involving the next_page parameter. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect potential exploitation attempts. Engage with the vendor to obtain patches or firmware updates as soon as they become available and plan for timely deployment. If patching is delayed, consider disabling or restricting the vulnerable httpd service or isolating affected devices. Conduct regular vulnerability scans and penetration tests focusing on this device to identify exposure. Educate network administrators about the threat and ensure incident response plans include scenarios involving device compromise through this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2023-35055: CWE-121: Stack-based Buffer Overflow in Yifan YF325
Description
A buffer overflow vulnerability exists in the httpd next_page functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.This buffer overflow is in the next_page parameter in the gozila_cgi function.
AI-Powered Analysis
Technical Analysis
CVE-2023-35055 identifies a stack-based buffer overflow vulnerability in the Yifan YF325 device, version v1.0_20221108. The flaw resides in the httpd server component, specifically within the next_page parameter processed by the gozila_cgi function. When a specially crafted network request is sent to this parameter, it causes a buffer overflow on the stack, which can overwrite control data and lead to arbitrary command execution on the device. The vulnerability does not require prior authentication but does require user interaction, likely meaning the attacker must send the malicious request to the device's exposed network interface. The CVSS 3.1 score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with network attack vector and low attack complexity. The vulnerability is categorized under CWE-121, indicating classic stack-based buffer overflow issues. No patches or known exploits are currently published, but the potential for remote code execution makes this a critical threat. The device's httpd service is the attack surface, and exploitation could allow attackers to take full control of the device, disrupt services, or pivot into internal networks.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those deploying Yifan YF325 devices in critical infrastructure, industrial control systems, or network edge environments. Successful exploitation could lead to full device compromise, enabling attackers to execute arbitrary commands, disrupt device functionality, exfiltrate sensitive data, or use the device as a foothold for lateral movement within the network. This could impact confidentiality by exposing sensitive information, integrity by allowing unauthorized changes, and availability by causing denial of service. The lack of authentication requirement increases the attack surface, particularly if devices are exposed to untrusted networks or the internet. The requirement for user interaction may limit automated exploitation but does not eliminate risk in environments where attackers can send crafted requests directly. The absence of known exploits in the wild provides a window for proactive defense, but the high CVSS score demands urgent attention.
Mitigation Recommendations
European organizations should immediately implement network segmentation and restrict access to Yifan YF325 devices, ensuring they are not exposed to untrusted networks or the internet. Deploy strict firewall rules to limit incoming traffic to trusted sources only. Monitor network traffic for unusual or malformed requests targeting the httpd service, especially those involving the next_page parameter. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect potential exploitation attempts. Engage with the vendor to obtain patches or firmware updates as soon as they become available and plan for timely deployment. If patching is delayed, consider disabling or restricting the vulnerable httpd service or isolating affected devices. Conduct regular vulnerability scans and penetration tests focusing on this device to identify exposure. Educate network administrators about the threat and ensure incident response plans include scenarios involving device compromise through this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-06-12T15:52:42.060Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a53242a90255b94da6682
Added to database: 11/4/2025, 7:25:24 PM
Last enriched: 11/4/2025, 8:20:16 PM
Last updated: 11/6/2025, 8:22:30 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumCVE-2025-12471: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nerdpressteam Hubbub Lite – Fast, free social sharing and follow buttons
MediumCVE-2025-9338: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in ASUS Armoury Crate
HighCVE-2025-12560: CWE-918 Server-Side Request Forgery (SSRF) in pr-gateway Blog2Social: Social Media Auto Post & Scheduler
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.