Milesight

Ur32l Firmware

66 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.13%
  • Veröffentlicht 06.07.2023 15:15:13
  • Zuletzt bearbeitet 04.11.2025 20:16:21

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges ...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 06.07.2023 15:15:13
  • Zuletzt bearbeitet 04.11.2025 20:16:21

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges ...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 06.07.2023 15:15:13
  • Zuletzt bearbeitet 04.11.2025 20:16:21

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges ...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 06.07.2023 15:15:13
  • Zuletzt bearbeitet 04.11.2025 20:16:20

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges ...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 06.07.2023 15:15:13
  • Zuletzt bearbeitet 04.11.2025 20:16:20

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges ...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 06.07.2023 15:15:13
  • Zuletzt bearbeitet 04.11.2025 20:16:20

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges ...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 06.07.2023 15:15:13
  • Zuletzt bearbeitet 04.11.2025 20:16:20

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges ...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 06.07.2023 15:15:13
  • Zuletzt bearbeitet 04.11.2025 20:16:20

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges ...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 06.07.2023 15:15:13
  • Zuletzt bearbeitet 04.11.2025 20:16:20

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges ...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 06.07.2023 15:15:13
  • Zuletzt bearbeitet 04.11.2025 20:16:20

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges ...