A firmware update vulnerability exists in the luci2-io file-import functionality of Milesight UR32L v32.3.0.7-r2. A specially crafted network request can lead to arbitrary firmware update. An attacker can send a network request to trigger this vulnerability.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2023-1852 | Third Party Advisory |
| https://talosintelligence.com/vulnerability_reports/TALOS-2023-1852 | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 08:29
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:milesight:ur32l_firmware:32.3.0.7-r2:*:*:*:*:*:*:* cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
| First Time |
Milesight
Milesight ur32l Firmware Milesight ur32l |
|
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1852 - Third Party Advisory | |
| CWE |
01 May 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-01 16:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-47166
Mitre link : CVE-2023-47166
JSON object : View
Products Affected
milesight
- ur32l
- ur32l_firmware
CWE
No CWE.
