Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v18.104.22.168 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the handle_interface_acl function with the interface variable when out_acl is -1..This CVE has a CVSS3.1 score of 7.2 and a Base Severity of HIGH.
References for CVE-2023-25091 :
|Metric Type||Metric Score|