CVE-2023-25118 | Milesight UR32L 32.3.0.5 HTTP Request vtysh_ubus set_openvpn_client username/password stack-based overflow (TALOS-2023-1716)
A vulnerability categorized as critical has been discovered in Milesight UR32L 32.3.0.5. This vulnerability affects the function set_openvpn_client of the file vtysh_ubus of the component HTTP Request Handler. Such manipulation of the argument username/password leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2023-25118. The attack can be launched remotely. Moreover, an exploit is present.