CVE-2023-25115 | Milesight UR32L 32.3.0.5 HTTP Request vtysh_ubus set_openvpn_client remote_ip/port stack-based overflow (TALOS-2023-1716)
A vulnerability was found in Milesight UR32L 32.3.0.5. It has been rated as critical. This issue affects the function set_openvpn_client of the file vtysh_ubus of the component HTTP Request Handler. This manipulation of the argument remote_ip/port causes stack-based buffer overflow.
The identification of this vulnerability is CVE-2023-25115. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.