Milesight

Ur32l Firmware

66 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.09%
  • Veröffentlicht 06.07.2023 15:15:12
  • Zuletzt bearbeitet 04.11.2025 20:16:19

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges ...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 06.07.2023 15:15:12
  • Zuletzt bearbeitet 04.11.2025 20:16:19

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges ...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 06.07.2023 15:15:12
  • Zuletzt bearbeitet 04.11.2025 20:16:19

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges ...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 06.07.2023 15:15:12
  • Zuletzt bearbeitet 04.11.2025 20:16:19

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges ...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 06.07.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 07:47:16

A stack-based buffer overflow vulnerability exists in the urvpn_client http_connection_readcb functionality of Milesight UR32L v32.3.0.5. A specially crafted network packet can lead to a buffer overflow. An attacker can send a malicious packet to tri...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 06.07.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 07:47:15

A stack-based buffer overflow vulnerability exists in the libzebra.so.0.0.0 security_decrypt_password functionality of Milesight UR32L v32.3.0.5. A specially crafted HTTP request can lead to a buffer overflow. An authenticated attacker can send an HT...

Exploit
  • EPSS 1.53%
  • Veröffentlicht 06.07.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 07:47:03

A buffer overflow vulnerability exists in the uhttpd login functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to remote code execution. An attacker can send a network request to trigger this vulnerability.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 06.07.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 07:46:27

An access violation vulnerability exists in the eventcore functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to denial of service. An attacker can send a network request to trigger this vulnerability.

Exploit
  • EPSS 0.21%
  • Veröffentlicht 06.07.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 07:46:24

An OS command injection vulnerability exists in the ys_thirdparty user_delete functionality of Milesight UR32L v32.3.0.5. A specially crafted network packet can lead to command execution. An attacker can send a sequence of requests to trigger this vu...

Exploit
  • EPSS 0.36%
  • Veröffentlicht 06.07.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 07:46:23

A directory traversal vulnerability exists in the luci2-io file-export mib functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to arbitrary file read. An attacker can send a network request to trigger this vulnera...