Description
A stack-based buffer overflow vulnerability exists in the urvpn_client http_connection_readcb functionality of Milesight UR32L v32.3.0.5. A specially crafted network packet can lead to a buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1718
Third Party Advisory
https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1718
Scores
CVSS v3
8.1
EPSS
0.0011
EPSS Percentile
28.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-120
CWE-787
Status
published
Products (1)
milesight/ur32l_firmware
32.3.0.5
Published
Jul 06, 2023
Tracked Since
Feb 18, 2026