Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-28537 | Two OS command injection vulnerability exist in the vtysh_ubus toolsh_excute.constprop.1 functionality of Milesight UR32L v32.3.0.5. A specially-crafted network request can lead to command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is in the ping tool utility. |
Tue, 04 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 14 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-11-04T19:14:43.973Z
Reserved: 2023-01-25T15:05:01.029Z
Link: CVE-2023-24519
Updated: 2025-11-04T19:14:43.973Z
Status : Modified
Published: 2023-07-06T15:15:12.107
Modified: 2025-11-04T20:16:17.653
Link: CVE-2023-24519
No data.
OpenCVE Enrichment
No data.
EUVD