Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-35966: CWE-190: Integer Overflow or Wraparound in Yifan YF325

0
Critical
VulnerabilityCVE-2023-35966cvecve-2023-35966cwe-190
Published: Wed Oct 11 2023 (10/11/2023, 15:14:28 UTC)
Source: CVE Database V5
Vendor/Project: Yifan
Product: YF325

Description

Two heap-based buffer overflow vulnerabilities exist in the httpd manage_post functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:40:29 UTC

Technical Analysis

CVE-2023-35966 is a critical security vulnerability identified in the Yifan YF325 device, specifically affecting version v1.0_20221108. The vulnerability is caused by an integer overflow (CWE-190) in the httpd manage_post functionality. This integer overflow leads to an incorrect calculation of the size argument passed to the realloc function, which is used to resize heap memory buffers. When the size calculation wraps around due to the overflow, realloc may allocate less memory than required, resulting in a heap-based buffer overflow. An attacker can exploit this by sending a specially crafted network request to the vulnerable httpd service, which does not require authentication or user interaction. Successful exploitation can allow remote code execution, enabling the attacker to execute arbitrary code with the privileges of the affected process, or cause a denial of service by crashing the service. The vulnerability has a CVSS 3.1 base score of 9.8, reflecting its critical nature with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a high-risk issue that demands immediate attention. The lack of available patches or mitigations from the vendor at the time of disclosure increases the urgency for organizations to implement compensating controls.

Potential Impact

For European organizations, exploitation of CVE-2023-35966 could have severe consequences. The ability to remotely execute arbitrary code or cause denial of service on Yifan YF325 devices could disrupt critical network infrastructure, especially if these devices are used in enterprise or industrial environments. Confidentiality could be compromised if attackers gain access to sensitive data processed or routed by the device. Integrity and availability are also at high risk, as attackers could manipulate device behavior or cause outages. Given the device’s role in network management, exploitation could serve as a foothold for lateral movement within corporate networks, increasing the risk of broader compromise. The critical CVSS score underscores the potential for widespread impact, particularly in sectors such as telecommunications, manufacturing, or public utilities where Yifan devices might be deployed. The absence of known exploits currently provides a window for proactive defense, but the ease of exploitation and network accessibility make rapid mitigation essential to prevent future attacks.

Mitigation Recommendations

European organizations should immediately identify any Yifan YF325 devices running version v1.0_20221108 within their networks. Since no official patches are currently available, organizations should implement network-level mitigations such as restricting access to the httpd management interface to trusted IP addresses only, using network segmentation to isolate vulnerable devices, and deploying intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection for suspicious manage_post requests. Monitoring network traffic for unusual patterns targeting the httpd service is critical. Organizations should also engage with the vendor for updates on patches or firmware upgrades and plan for rapid deployment once available. Additionally, applying strict firewall rules to block unsolicited inbound traffic to the affected devices and conducting regular vulnerability scans to detect presence of vulnerable versions will reduce exposure. Incident response teams should prepare to detect and respond to potential exploitation attempts. Finally, consider replacing or upgrading devices if vendor support is limited or delayed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-06-20T18:36:46.429Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a53242a90255b94da6696

Added to database: 11/4/2025, 7:25:24 PM

Last enriched: 11/4/2025, 7:40:29 PM

Last updated: 11/6/2025, 8:26:08 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats