Skip to content

CVE-2023-24019 | UR32L

A stack-based buffer overflow vulnerability exists in the urvpn_client http_connection_readcb functionality of Milesight UR32L v32.3.0.5. A specially crafted network packet can lead to a buffer overflow. An attacker can send a malicious packet to trigger this vulnerability..This CVE has a CVSS3.1 score of 8.1 and a Base Severity of HIGH.

InfoDetails
CVE IDCVE-2023-24019
CVE StatePUBLISHED
BaseScore8.1
BaseSeverityHIGH
VectorStringCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
VersionNA

References for CVE-2023-24019 :
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1718

Metric TypeMetric Score
AttackVector(AV)NETWORK
AttackComplexity(AC)HIGH
PrivilegesRequired(PR)NONE
UserInteraction(UI)NONE
Scope(S)UNCHANGED
Confidentiality(C)HIGH
Availability(A)HIGH
Integrity(I)HIGH