CVE-2023-25122 | Milesight UR32L 32.3.0.5 HTTP Request vtysh_ubus set_openvpn_client old_remote_subnet/old_remote_mask stack-based overflow (TALOS-2023-1716)
A vulnerability identified as critical has been detected in Milesight UR32L 32.3.0.5. The affected element is the function set_openvpn_client of the file vtysh_ubus of the component HTTP Request Handler. Performing manipulation of the argument old_remote_subnet/old_remote_mask results in stack-based buffer overflow.
This vulnerability is identified as CVE-2023-25122. The attack can be initiated remotely. Additionally, an exploit exists.