First published: Thu Jul 06 2023(Updated: )
A buffer overflow vulnerability exists in the uhttpd login functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to remote code execution. An attacker can send a network request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Milesight Ur32l Firmware | =32.3.0.5 | |
Milesight UR32L |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23902 is classified as a critical vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2023-23902, update the Milesight UR32L firmware to the latest version that addresses this buffer overflow vulnerability.
CVE-2023-23902 is caused by a buffer overflow in the uhttpd login functionality of Milesight UR32L v32.3.0.5.
Devices running Milesight UR32L with firmware version 32.3.0.5 are impacted by CVE-2023-23902.
Yes, CVE-2023-23902 can lead to unauthorized remote access and potential data breaches if exploited by an attacker.