Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-35967: CWE-190: Integer Overflow or Wraparound in Yifan YF325

0
Critical
VulnerabilityCVE-2023-35967cvecve-2023-35967cwe-190
Published: Wed Oct 11 2023 (10/11/2023, 15:14:27 UTC)
Source: CVE Database V5
Vendor/Project: Yifan
Product: YF325

Description

Two heap-based buffer overflow vulnerabilities exist in the gwcfg_cgi_set_manage_post_data functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:40:16 UTC

Technical Analysis

CVE-2023-35967 identifies a critical security vulnerability in the Yifan YF325 device firmware version v1.0_20221108. The flaw is an integer overflow (CWE-190) in the function gwcfg_cgi_set_manage_post_data, which processes network POST requests. Specifically, the integer overflow occurs when input data is used to calculate a size argument for the malloc function, leading to an allocation smaller than intended. This miscalculation causes a heap-based buffer overflow when the device writes data beyond the allocated memory boundary. Such a condition can corrupt memory, potentially allowing remote attackers to execute arbitrary code, crash the device, or alter its operation. The vulnerability requires no authentication and no user interaction, making it exploitable remotely over the network. The CVSS v3.1 base score of 9.8 reflects the critical impact on confidentiality, integrity, and availability, combined with the low attack complexity and network vector. Although no public exploits are currently known, the vulnerability’s characteristics make it a prime target for exploitation once weaponized. The affected product, Yifan YF325, is an embedded device likely used in network or IoT contexts, increasing the risk of widespread impact if exploited. The lack of a vendor patch at the time of disclosure necessitates immediate defensive measures.

Potential Impact

For European organizations, exploitation of CVE-2023-35967 could lead to severe consequences including unauthorized remote code execution, full device compromise, and denial of service. This could disrupt critical network infrastructure or IoT deployments, leading to operational downtime, data breaches, or lateral movement within corporate networks. The vulnerability’s remote and unauthenticated nature increases the risk of widespread attacks, especially in environments where Yifan YF325 devices are deployed at scale. Sectors such as telecommunications, manufacturing, smart city infrastructure, and critical utilities that rely on embedded network devices are particularly vulnerable. The potential for attackers to gain persistent footholds or disrupt services could have cascading effects on business continuity and regulatory compliance under frameworks like GDPR. Additionally, the critical severity score underscores the urgency for European entities to assess their exposure and implement mitigations promptly.

Mitigation Recommendations

1. Immediately identify and inventory all Yifan YF325 devices running the vulnerable firmware version v1.0_20221108 within the network. 2. Implement network segmentation to isolate these devices from critical infrastructure and sensitive data environments, limiting exposure to potential attackers. 3. Disable or restrict access to the vulnerable gwcfg_cgi_set_manage_post_data functionality if possible, or block the specific network requests that trigger the vulnerability using firewall or intrusion prevention systems. 4. Monitor network traffic for anomalous POST requests targeting the device’s management interface, employing deep packet inspection where feasible. 5. Engage with the vendor for firmware updates or patches; if unavailable, consider temporary device replacement or enhanced monitoring. 6. Apply strict access controls and network-level authentication to management interfaces to reduce attack surface. 7. Prepare incident response plans specific to potential exploitation scenarios involving these devices. 8. Regularly update threat intelligence feeds to detect emerging exploit attempts targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-06-20T18:37:39.611Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a53252a90255b94da66d9

Added to database: 11/4/2025, 7:25:25 PM

Last enriched: 11/4/2025, 7:40:16 PM

Last updated: 11/6/2025, 7:34:47 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats