A firmware update vulnerability exists in the luci2-io file-import functionality of Milesight UR32L v32.3.0.7-r2. A specially crafted network request can lead to arbitrary firmware update. An attacker can send a network request to trigger this vulnerability.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1852 | Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1852 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:milesight:ur32l_firmware:32.3.0.7-r2:*:*:*:*:*:*:* cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
First Time |
Milesight
Milesight ur32l Firmware Milesight ur32l |
|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1852 - Third Party Advisory | |
CWE |
01 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 16:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-47166
Mitre link : CVE-2023-47166
JSON object : View
Products Affected
milesight
- ur32l
- ur32l_firmware
CWE
No CWE.