First published: Thu Jul 06 2023(Updated: )
Two OS command injection vulnerabilities exist in the urvpn_client cmd_name_action functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger these vulnerabilities.This OS command injection is triggered through a UDP packet.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Milesight UR-32L | =32.3.0.5 | |
Milesight UR-32L |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OS command injection vulnerability is CVE-2023-24583.
The affected software is Milesight UR32L v32.3.0.5 firmware.
This vulnerability has a severity rating of 8.8 (high).
This vulnerability can be exploited by sending a specially crafted network request to the urvpn_client cmd_name_action functionality of Milesight UR32L v32.3.0.5, allowing arbitrary command execution.
It is recommended to update to a fixed version of Milesight UR32L firmware to mitigate this vulnerability.