Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v18.104.22.168 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the rule_name variable with two possible format strings that represent negated commands..This CVE has a CVSS3.1 score of 7.2 and a Base Severity of HIGH.
References for CVE-2023-25095 :
|Metric Type||Metric Score|