CVE-2023-35966: CWE-190: Integer Overflow or Wraparound in Yifan YF325
Two heap-based buffer overflow vulnerabilities exist in the httpd manage_post functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function.
AI Analysis
Technical Summary
CVE-2023-35966 is a critical security vulnerability identified in the Yifan YF325 device, specifically affecting version v1.0_20221108. The vulnerability is caused by an integer overflow (CWE-190) in the httpd manage_post functionality. This integer overflow leads to an incorrect calculation of the size argument passed to the realloc function, which is used to resize heap memory buffers. When the size calculation wraps around due to the overflow, realloc may allocate less memory than required, resulting in a heap-based buffer overflow. An attacker can exploit this by sending a specially crafted network request to the vulnerable httpd service, which does not require authentication or user interaction. Successful exploitation can allow remote code execution, enabling the attacker to execute arbitrary code with the privileges of the affected process, or cause a denial of service by crashing the service. The vulnerability has a CVSS 3.1 base score of 9.8, reflecting its critical nature with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a high-risk issue that demands immediate attention. The lack of available patches or mitigations from the vendor at the time of disclosure increases the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations, exploitation of CVE-2023-35966 could have severe consequences. The ability to remotely execute arbitrary code or cause denial of service on Yifan YF325 devices could disrupt critical network infrastructure, especially if these devices are used in enterprise or industrial environments. Confidentiality could be compromised if attackers gain access to sensitive data processed or routed by the device. Integrity and availability are also at high risk, as attackers could manipulate device behavior or cause outages. Given the device’s role in network management, exploitation could serve as a foothold for lateral movement within corporate networks, increasing the risk of broader compromise. The critical CVSS score underscores the potential for widespread impact, particularly in sectors such as telecommunications, manufacturing, or public utilities where Yifan devices might be deployed. The absence of known exploits currently provides a window for proactive defense, but the ease of exploitation and network accessibility make rapid mitigation essential to prevent future attacks.
Mitigation Recommendations
European organizations should immediately identify any Yifan YF325 devices running version v1.0_20221108 within their networks. Since no official patches are currently available, organizations should implement network-level mitigations such as restricting access to the httpd management interface to trusted IP addresses only, using network segmentation to isolate vulnerable devices, and deploying intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection for suspicious manage_post requests. Monitoring network traffic for unusual patterns targeting the httpd service is critical. Organizations should also engage with the vendor for updates on patches or firmware upgrades and plan for rapid deployment once available. Additionally, applying strict firewall rules to block unsolicited inbound traffic to the affected devices and conducting regular vulnerability scans to detect presence of vulnerable versions will reduce exposure. Incident response teams should prepare to detect and respond to potential exploitation attempts. Finally, consider replacing or upgrading devices if vendor support is limited or delayed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2023-35966: CWE-190: Integer Overflow or Wraparound in Yifan YF325
Description
Two heap-based buffer overflow vulnerabilities exist in the httpd manage_post functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function.
AI-Powered Analysis
Technical Analysis
CVE-2023-35966 is a critical security vulnerability identified in the Yifan YF325 device, specifically affecting version v1.0_20221108. The vulnerability is caused by an integer overflow (CWE-190) in the httpd manage_post functionality. This integer overflow leads to an incorrect calculation of the size argument passed to the realloc function, which is used to resize heap memory buffers. When the size calculation wraps around due to the overflow, realloc may allocate less memory than required, resulting in a heap-based buffer overflow. An attacker can exploit this by sending a specially crafted network request to the vulnerable httpd service, which does not require authentication or user interaction. Successful exploitation can allow remote code execution, enabling the attacker to execute arbitrary code with the privileges of the affected process, or cause a denial of service by crashing the service. The vulnerability has a CVSS 3.1 base score of 9.8, reflecting its critical nature with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a high-risk issue that demands immediate attention. The lack of available patches or mitigations from the vendor at the time of disclosure increases the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations, exploitation of CVE-2023-35966 could have severe consequences. The ability to remotely execute arbitrary code or cause denial of service on Yifan YF325 devices could disrupt critical network infrastructure, especially if these devices are used in enterprise or industrial environments. Confidentiality could be compromised if attackers gain access to sensitive data processed or routed by the device. Integrity and availability are also at high risk, as attackers could manipulate device behavior or cause outages. Given the device’s role in network management, exploitation could serve as a foothold for lateral movement within corporate networks, increasing the risk of broader compromise. The critical CVSS score underscores the potential for widespread impact, particularly in sectors such as telecommunications, manufacturing, or public utilities where Yifan devices might be deployed. The absence of known exploits currently provides a window for proactive defense, but the ease of exploitation and network accessibility make rapid mitigation essential to prevent future attacks.
Mitigation Recommendations
European organizations should immediately identify any Yifan YF325 devices running version v1.0_20221108 within their networks. Since no official patches are currently available, organizations should implement network-level mitigations such as restricting access to the httpd management interface to trusted IP addresses only, using network segmentation to isolate vulnerable devices, and deploying intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection for suspicious manage_post requests. Monitoring network traffic for unusual patterns targeting the httpd service is critical. Organizations should also engage with the vendor for updates on patches or firmware upgrades and plan for rapid deployment once available. Additionally, applying strict firewall rules to block unsolicited inbound traffic to the affected devices and conducting regular vulnerability scans to detect presence of vulnerable versions will reduce exposure. Incident response teams should prepare to detect and respond to potential exploitation attempts. Finally, consider replacing or upgrading devices if vendor support is limited or delayed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-06-20T18:36:46.429Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a53242a90255b94da6696
Added to database: 11/4/2025, 7:25:24 PM
Last enriched: 11/4/2025, 7:40:29 PM
Last updated: 11/6/2025, 8:26:08 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumCVE-2025-12471: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nerdpressteam Hubbub Lite – Fast, free social sharing and follow buttons
MediumCVE-2025-9338: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in ASUS Armoury Crate
HighCVE-2025-12560: CWE-918 Server-Side Request Forgery (SSRF) in pr-gateway Blog2Social: Social Media Auto Post & Scheduler
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.