Loading HuntDB...

GHSA-h56r-m96p-q46q

GitHub Security Advisory

⚠ Unreviewed HIGH Has CVE

Advisory Details

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the rule_name variable with two possible format strings that represent negated commands.

Related CVEs

Key Information

GHSA ID
GHSA-h56r-m96p-q46q
Published
July 6, 2023 3:30 PM
Last Modified
November 4, 2025 9:30 PM
CVSS Score
7.5 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: November 25, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.