Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v188.8.131.52 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the old_ip and old_mac variables..This CVE has a CVSS3.1 score of 7.2 and a Base Severity of HIGH.
References for CVE-2023-25082 :
|Metric Type||Metric Score|