Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-28083 | A stack-based buffer overflow vulnerability exists in the urvpn_client http_connection_readcb functionality of Milesight UR32L v32.3.0.5. A specially crafted network packet can lead to a buffer overflow. An attacker can send a malicious packet to trigger this vulnerability. |
Wed, 05 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-03-05T18:54:45.856Z
Reserved: 2023-02-06T21:20:16.643Z
Link: CVE-2023-24019
Updated: 2024-08-02T10:49:08.786Z
Status : Modified
Published: 2023-07-06T15:15:11.867
Modified: 2024-11-21T07:47:16.097
Link: CVE-2023-24019
No data.
OpenCVE Enrichment
No data.
EUVD