OS Command Injection Vulnerability in Milesight UR32L v32.3.0.5: Remote Command Execution via vtysh_ubus tcpdump_start_cb

OS Command Injection Vulnerability in Milesight UR32L v32.3.0.5: Remote Command Execution via vtysh_ubus tcpdump_start_cb

CVE-2023-22653 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

An OS command injection vulnerability exists in the vtysh_ubus tcpdump_start_cb functionality of Milesight UR32L v32.3.0.5. A specially crafted HTTP request can lead to command execution. An authenticated attacker can send an HTTP request to trigger this vulnerability.

Learn more about our Web Application Penetration Testing UK.