CVE-2023-47166

A firmware update vulnerability exists in the luci2-io file-import functionality of Milesight UR32L v32.3.0.7-r2. A specially crafted network request can lead to arbitrary firmware update. An attacker can send a network request to trigger this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:milesight:ur32l_firmware:32.3.0.7-r2:*:*:*:*:*:*:*
cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*

History

04 Nov 2025, 18:15

Type Values Removed Values Added
First Time Milesight
Milesight ur32l Firmware
Milesight ur32l
References
  • () https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1852 -
References () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1852 - () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1852 - Third Party Advisory
CWE CWE-306
CPE cpe:2.3:o:milesight:ur32l_firmware:32.3.0.7-r2:*:*:*:*:*:*:*
cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*

Information

Published : 2024-05-01 16:15

Updated : 2025-11-04 18:15


NVD link : CVE-2023-47166

Mitre link : CVE-2023-47166

CVE.ORG link : CVE-2023-47166


JSON object : View

Products Affected

milesight

  • ur32l_firmware
  • ur32l
CWE
CWE-285

Improper Authorization

CWE-306

Missing Authentication for Critical Function