CVE-2023-23550

7.2 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in the Milesight UR32L router's user deletion functionality. Attackers can execute arbitrary commands on the device by sending specially crafted network packets. This affects Milesight UR32L routers running vulnerable firmware versions.

💻 Affected Systems

Products:
  • Milesight UR32L
Versions: v32.3.0.5 and likely earlier versions
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the ys_thirdparty user_delete functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands with root privileges, potentially taking complete control of the router, intercepting network traffic, or using it as a foothold into internal networks.

🟠

Likely Case

Remote code execution leading to router configuration changes, credential theft, installation of persistent backdoors, or use in botnets.

🟢

If Mitigated

Limited impact if network segmentation isolates the router and proper access controls prevent unauthorized network access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The Talos Intelligence report includes technical details that could be used to create exploits. The vulnerability requires network access but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Milesight website for security advisories
2. Download latest firmware if available
3. Backup current configuration
4. Upload and install new firmware
5. Restart router
6. Restore configuration if needed

🔧 Temporary Workarounds

Network Segmentation

all

Isolate UR32L routers from untrusted networks and restrict access to management interfaces

Access Control Lists

all

Implement firewall rules to restrict access to the vulnerable endpoint

🧯 If You Can't Patch

  • Segment the UR32L router on a dedicated VLAN with strict access controls
  • Monitor network traffic for unusual patterns or attempts to access the user_delete functionality

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface or SSH: cat /etc/version

Check Version:

cat /etc/version

Verify Fix Applied:

Verify firmware version is newer than v32.3.0.5 and test user_delete functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual user deletion attempts
  • Command execution patterns in system logs
  • Failed authentication attempts to management interface

Network Indicators:

  • Unusual traffic to user_delete endpoint
  • Unexpected outbound connections from router
  • Anomalous packet patterns

SIEM Query:

source="router_logs" AND ("user_delete" OR "ys_thirdparty") AND status="success"

🔗 References

📤 Share & Export