Description
A stack-based buffer overflow vulnerability exists in the libzebra.so.0.0.0 security_decrypt_password functionality of Milesight UR32L v32.3.0.5. A specially crafted HTTP request can lead to a buffer overflow. An authenticated attacker can send an HTTP request to trigger this vulnerability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-28082 | A stack-based buffer overflow vulnerability exists in the libzebra.so.0.0.0 security_decrypt_password functionality of Milesight UR32L v32.3.0.5. A specially crafted HTTP request can lead to a buffer overflow. An authenticated attacker can send an HTTP request to trigger this vulnerability. |
References
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-02T10:49:09.071Z
Reserved: 2023-02-02T20:00:37.715Z
Link: CVE-2023-24018
Updated: 2024-08-02T10:49:09.071Z
Status : Modified
Published: 2023-07-06T15:15:11.797
Modified: 2024-11-21T07:47:15.980
Link: CVE-2023-24018
No data.
OpenCVE Enrichment
No data.
EUVD