Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-35965: CWE-190: Integer Overflow or Wraparound in Yifan YF325

0
Critical
VulnerabilityCVE-2023-35965cvecve-2023-35965cwe-190
Published: Wed Oct 11 2023 (10/11/2023, 15:14:28 UTC)
Source: CVE Database V5
Vendor/Project: Yifan
Product: YF325

Description

Two heap-based buffer overflow vulnerabilities exist in the httpd manage_post functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:40:43 UTC

Technical Analysis

CVE-2023-35965 is a critical security vulnerability identified in the Yifan YF325 device, specifically in version v1.0_20221108. The flaw is due to an integer overflow (CWE-190) in the httpd manage_post functionality, where a specially crafted network request causes the integer value used as an argument to malloc to wrap around. This results in allocating less memory than required, leading to a heap-based buffer overflow. Because the vulnerability is triggered remotely over the network without any authentication or user interaction, an attacker can exploit it to execute arbitrary code, cause denial of service, or fully compromise the device. The vulnerability affects the core HTTP server component of the device, which likely handles management or configuration requests. The CVSS v3.1 score of 9.8 reflects the critical nature of this flaw, with high impact on confidentiality, integrity, and availability, and low attack complexity. Although no public exploits have been reported yet, the ease of exploitation and severity make it a significant threat. The absence of patches at the time of publication increases the urgency for mitigation. The Yifan YF325 is a specialized hardware product, and the vulnerability could be leveraged to gain persistent control over affected devices, potentially impacting network operations and sensitive data handled by these devices.

Potential Impact

For European organizations, the impact of CVE-2023-35965 could be severe. Compromise of Yifan YF325 devices may lead to unauthorized access to sensitive information, disruption of network services, and potential lateral movement within corporate or critical infrastructure networks. Given the critical severity and remote exploitability, attackers could deploy ransomware, exfiltrate data, or disrupt operations. Sectors such as telecommunications, industrial control systems, and government agencies that may deploy Yifan devices for network management or monitoring are particularly at risk. The vulnerability could undermine trust in network security and lead to regulatory and compliance issues under GDPR if personal data is exposed. The lack of authentication requirement increases the attack surface, making perimeter defenses critical. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score suggests that exploitation could have devastating consequences.

Mitigation Recommendations

1. Monitor Yifan’s official channels for security advisories and promptly apply any released patches or firmware updates addressing CVE-2023-35965. 2. Until patches are available, restrict network access to the httpd management interface of YF325 devices using firewall rules or network segmentation to limit exposure to trusted management hosts only. 3. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection capable of identifying malformed HTTP requests targeting the manage_post functionality. 4. Conduct thorough inventory and asset management to identify all Yifan YF325 devices within the network and assess their exposure. 5. Implement strict network access controls and multi-factor authentication on management interfaces where possible to reduce risk from lateral movement. 6. Regularly audit device logs for suspicious activity indicative of exploitation attempts. 7. Consider deploying network-level mitigations such as web application firewalls (WAF) that can block suspicious payloads targeting integer overflow patterns. 8. Engage with Yifan support or vendors to obtain guidance and potential workarounds if patches are delayed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-06-20T18:36:46.429Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a53242a90255b94da6692

Added to database: 11/4/2025, 7:25:24 PM

Last enriched: 11/4/2025, 7:40:43 PM

Last updated: 11/6/2025, 9:37:55 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats