Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-35056: CWE-121: Stack-based Buffer Overflow in Yifan YF325

0
High
VulnerabilityCVE-2023-35056cvecve-2023-35056cwe-121
Published: Wed Oct 11 2023 (10/11/2023, 15:14:31 UTC)
Source: CVE Database V5
Vendor/Project: Yifan
Product: YF325

Description

A buffer overflow vulnerability exists in the httpd next_page functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.This buffer overflow is in the next_page parameter in the cgi_handler function.

AI-Powered Analysis

AILast updated: 11/04/2025, 20:20:01 UTC

Technical Analysis

CVE-2023-35056 is a stack-based buffer overflow vulnerability identified in the Yifan YF325 device, specifically in the httpd server's next_page parameter within the cgi_handler function. The vulnerability arises due to improper bounds checking when processing the next_page parameter in network requests, allowing an attacker to overflow the stack buffer. This overflow can overwrite critical memory regions, enabling arbitrary code execution on the device. The flaw is exploitable remotely over the network without requiring prior authentication, although user interaction (such as triggering the request) is necessary. The vulnerability affects version v1.0_20221108 of the YF325 device. The CVSS 3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. While no public exploits have been reported yet, the potential for remote command execution makes this a critical risk. The YF325 device is typically used in industrial or specialized network environments, where compromise could lead to operational disruptions or data breaches. The lack of an official patch at the time of reporting necessitates immediate risk mitigation through network controls and monitoring.

Potential Impact

For European organizations, exploitation of CVE-2023-35056 could lead to full compromise of affected Yifan YF325 devices, resulting in unauthorized command execution. This can cause severe confidentiality breaches, data manipulation, and service disruption. Industrial control systems or network infrastructure relying on these devices may experience downtime or operational failures, impacting business continuity and safety. Given the device’s role in specialized environments, attackers could leverage this vulnerability to pivot within networks, escalate privileges, or exfiltrate sensitive information. The absence of authentication requirements lowers the barrier for attackers, increasing the risk of widespread exploitation if the vulnerability becomes publicly weaponized. European entities in sectors such as manufacturing, utilities, and critical infrastructure are particularly at risk due to the potential cascading effects of device compromise.

Mitigation Recommendations

1. Immediately restrict network access to Yifan YF325 devices by implementing firewall rules that limit incoming traffic to trusted sources only. 2. Employ network segmentation to isolate these devices from general enterprise networks, reducing the attack surface. 3. Monitor network traffic for unusual or malformed requests targeting the httpd service, especially those containing the next_page parameter. 4. Disable or restrict access to the vulnerable httpd service if feasible until a vendor patch is available. 5. Engage with the vendor to obtain security updates or patches and apply them promptly once released. 6. Conduct regular vulnerability scans and penetration tests focusing on Yifan devices to detect potential exploitation attempts. 7. Implement intrusion detection/prevention systems (IDS/IPS) tuned to detect buffer overflow attack patterns targeting CGI handlers. 8. Educate network administrators about this vulnerability and ensure incident response plans include procedures for Yifan device compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-06-12T15:52:42.060Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a53242a90255b94da6686

Added to database: 11/4/2025, 7:25:24 PM

Last enriched: 11/4/2025, 8:20:01 PM

Last updated: 11/6/2025, 9:27:02 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats