A firmware update vulnerability exists in the luci2-io file-import functionality of Milesight UR32L v32.3.0.7-r2. A specially crafted network request can lead to arbitrary firmware update. An attacker can send a network request to trigger this vulnerability.
References
| Link | Resource |
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2023-1852 | Third Party Advisory |
| https://talosintelligence.com/vulnerability_reports/TALOS-2023-1852 | Third Party Advisory |
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1852 |
Configurations
Configuration 1 (hide)
| AND |
|
History
04 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Milesight
Milesight ur32l Firmware Milesight ur32l |
|
| References |
|
|
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1852 - Third Party Advisory | |
| CWE | CWE-306 | |
| CPE | cpe:2.3:o:milesight:ur32l_firmware:32.3.0.7-r2:*:*:*:*:*:*:* cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:* |
Information
Published : 2024-05-01 16:15
Updated : 2025-11-04 18:15
NVD link : CVE-2023-47166
Mitre link : CVE-2023-47166
CVE.ORG link : CVE-2023-47166
JSON object : View
Products Affected
milesight
- ur32l_firmware
- ur32l
