CVE-2023-35967: CWE-190: Integer Overflow or Wraparound in Yifan YF325
Two heap-based buffer overflow vulnerabilities exist in the gwcfg_cgi_set_manage_post_data functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function.
AI Analysis
Technical Summary
CVE-2023-35967 identifies a critical security vulnerability in the Yifan YF325 device firmware version v1.0_20221108. The flaw is an integer overflow (CWE-190) in the function gwcfg_cgi_set_manage_post_data, which processes network POST requests. Specifically, the integer overflow occurs when input data is used to calculate a size argument for the malloc function, leading to an allocation smaller than intended. This miscalculation causes a heap-based buffer overflow when the device writes data beyond the allocated memory boundary. Such a condition can corrupt memory, potentially allowing remote attackers to execute arbitrary code, crash the device, or alter its operation. The vulnerability requires no authentication and no user interaction, making it exploitable remotely over the network. The CVSS v3.1 base score of 9.8 reflects the critical impact on confidentiality, integrity, and availability, combined with the low attack complexity and network vector. Although no public exploits are currently known, the vulnerability’s characteristics make it a prime target for exploitation once weaponized. The affected product, Yifan YF325, is an embedded device likely used in network or IoT contexts, increasing the risk of widespread impact if exploited. The lack of a vendor patch at the time of disclosure necessitates immediate defensive measures.
Potential Impact
For European organizations, exploitation of CVE-2023-35967 could lead to severe consequences including unauthorized remote code execution, full device compromise, and denial of service. This could disrupt critical network infrastructure or IoT deployments, leading to operational downtime, data breaches, or lateral movement within corporate networks. The vulnerability’s remote and unauthenticated nature increases the risk of widespread attacks, especially in environments where Yifan YF325 devices are deployed at scale. Sectors such as telecommunications, manufacturing, smart city infrastructure, and critical utilities that rely on embedded network devices are particularly vulnerable. The potential for attackers to gain persistent footholds or disrupt services could have cascading effects on business continuity and regulatory compliance under frameworks like GDPR. Additionally, the critical severity score underscores the urgency for European entities to assess their exposure and implement mitigations promptly.
Mitigation Recommendations
1. Immediately identify and inventory all Yifan YF325 devices running the vulnerable firmware version v1.0_20221108 within the network. 2. Implement network segmentation to isolate these devices from critical infrastructure and sensitive data environments, limiting exposure to potential attackers. 3. Disable or restrict access to the vulnerable gwcfg_cgi_set_manage_post_data functionality if possible, or block the specific network requests that trigger the vulnerability using firewall or intrusion prevention systems. 4. Monitor network traffic for anomalous POST requests targeting the device’s management interface, employing deep packet inspection where feasible. 5. Engage with the vendor for firmware updates or patches; if unavailable, consider temporary device replacement or enhanced monitoring. 6. Apply strict access controls and network-level authentication to management interfaces to reduce attack surface. 7. Prepare incident response plans specific to potential exploitation scenarios involving these devices. 8. Regularly update threat intelligence feeds to detect emerging exploit attempts targeting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2023-35967: CWE-190: Integer Overflow or Wraparound in Yifan YF325
Description
Two heap-based buffer overflow vulnerabilities exist in the gwcfg_cgi_set_manage_post_data functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function.
AI-Powered Analysis
Technical Analysis
CVE-2023-35967 identifies a critical security vulnerability in the Yifan YF325 device firmware version v1.0_20221108. The flaw is an integer overflow (CWE-190) in the function gwcfg_cgi_set_manage_post_data, which processes network POST requests. Specifically, the integer overflow occurs when input data is used to calculate a size argument for the malloc function, leading to an allocation smaller than intended. This miscalculation causes a heap-based buffer overflow when the device writes data beyond the allocated memory boundary. Such a condition can corrupt memory, potentially allowing remote attackers to execute arbitrary code, crash the device, or alter its operation. The vulnerability requires no authentication and no user interaction, making it exploitable remotely over the network. The CVSS v3.1 base score of 9.8 reflects the critical impact on confidentiality, integrity, and availability, combined with the low attack complexity and network vector. Although no public exploits are currently known, the vulnerability’s characteristics make it a prime target for exploitation once weaponized. The affected product, Yifan YF325, is an embedded device likely used in network or IoT contexts, increasing the risk of widespread impact if exploited. The lack of a vendor patch at the time of disclosure necessitates immediate defensive measures.
Potential Impact
For European organizations, exploitation of CVE-2023-35967 could lead to severe consequences including unauthorized remote code execution, full device compromise, and denial of service. This could disrupt critical network infrastructure or IoT deployments, leading to operational downtime, data breaches, or lateral movement within corporate networks. The vulnerability’s remote and unauthenticated nature increases the risk of widespread attacks, especially in environments where Yifan YF325 devices are deployed at scale. Sectors such as telecommunications, manufacturing, smart city infrastructure, and critical utilities that rely on embedded network devices are particularly vulnerable. The potential for attackers to gain persistent footholds or disrupt services could have cascading effects on business continuity and regulatory compliance under frameworks like GDPR. Additionally, the critical severity score underscores the urgency for European entities to assess their exposure and implement mitigations promptly.
Mitigation Recommendations
1. Immediately identify and inventory all Yifan YF325 devices running the vulnerable firmware version v1.0_20221108 within the network. 2. Implement network segmentation to isolate these devices from critical infrastructure and sensitive data environments, limiting exposure to potential attackers. 3. Disable or restrict access to the vulnerable gwcfg_cgi_set_manage_post_data functionality if possible, or block the specific network requests that trigger the vulnerability using firewall or intrusion prevention systems. 4. Monitor network traffic for anomalous POST requests targeting the device’s management interface, employing deep packet inspection where feasible. 5. Engage with the vendor for firmware updates or patches; if unavailable, consider temporary device replacement or enhanced monitoring. 6. Apply strict access controls and network-level authentication to management interfaces to reduce attack surface. 7. Prepare incident response plans specific to potential exploitation scenarios involving these devices. 8. Regularly update threat intelligence feeds to detect emerging exploit attempts targeting this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-06-20T18:37:39.611Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a53252a90255b94da66d9
Added to database: 11/4/2025, 7:25:25 PM
Last enriched: 11/4/2025, 7:40:16 PM
Last updated: 11/6/2025, 7:34:47 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumCVE-2025-12471: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nerdpressteam Hubbub Lite – Fast, free social sharing and follow buttons
MediumCVE-2025-9338: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in ASUS Armoury Crate
HighCVE-2025-12560: CWE-918 Server-Side Request Forgery (SSRF) in pr-gateway Blog2Social: Social Media Auto Post & Scheduler
MediumCVE-2025-12563: CWE-862 Missing Authorization in pr-gateway Blog2Social: Social Media Auto Post & Scheduler
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.