Show filters
66 Total Results
Displaying 1-10 of 66
Sort by:
Attacker Value
Unknown
CVE-2023-47166
Disclosure Date: May 01, 2024 (last updated January 05, 2025)
A firmware update vulnerability exists in the luci2-io file-import functionality of Milesight UR32L v32.3.0.7-r2. A specially crafted network request can lead to arbitrary firmware update. An attacker can send a network request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-43260
Disclosure Date: October 05, 2023 (last updated October 12, 2023)
Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 was discovered to contain a cross-site scripting (XSS) vulnerability via the admin panel.
0
Attacker Value
Unknown
CVE-2023-43261
Disclosure Date: October 04, 2023 (last updated October 12, 2023)
An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 allows attackers to access sensitive router components.
0
Attacker Value
Unknown
CVE-2023-25583
Disclosure Date: July 06, 2023 (last updated October 08, 2023)
Two OS command injection vulnerabilities exist in the zebra vlan_name functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is in the code branch that manages a new vlan configuration.
0
Attacker Value
Unknown
CVE-2023-25582
Disclosure Date: July 06, 2023 (last updated October 08, 2023)
Two OS command injection vulnerabilities exist in the zebra vlan_name functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is in the code branch that manages an already existing vlan configuration.
0
Attacker Value
Unknown
CVE-2023-25124
Disclosure Date: July 06, 2023 (last updated October 08, 2023)
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the remote_subnet and the remote_mask variables.
0
Attacker Value
Unknown
CVE-2023-25123
Disclosure Date: July 06, 2023 (last updated October 08, 2023)
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the remote_subnet and the remote_mask variables when action is 2.
0
Attacker Value
Unknown
CVE-2023-25122
Disclosure Date: July 06, 2023 (last updated October 08, 2023)
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the old_remote_subnet and the old_remote_mask variables.
0
Attacker Value
Unknown
CVE-2023-25121
Disclosure Date: July 06, 2023 (last updated October 08, 2023)
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_ike_profile function with the secrets_local variable.
0
Attacker Value
Unknown
CVE-2023-25120
Disclosure Date: July 06, 2023 (last updated October 08, 2023)
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_dmvpn function with the cisco_secret variable.
0