PT-2023-5865 · Milesight · Milesight Ur32L +3
Win3Zz
·
Published
2023-10-01
·
Updated
2025-10-02
·
CVE-2023-43261
CVSS v2.0
7.8
7.8
High
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
Milesight UR5X, UR32L, UR32, UR35, UR41 versions prior to 35.3.0.7
Description
An information disclosure issue exists in Milesight routers. This allows attackers to access sensitive router components. Reports indicate that approximately 19,000 Milesight routers with exposed APIs have been identified, with at least 572 publicly accessible without authentication. This has been exploited in real-world attacks, primarily in Europe (Sweden, Italy, Belgium), to send SMS spam containing phishing links. The vulnerability allows attackers to view system logs, locate, and compromise administrator passwords. These compromised credentials can then be used to abuse the router's SMS API to send malicious messages. The API can be exploited due to misconfigurations or the presence of the vulnerability. The attackers are leveraging the SMS notification feature commonly found in industrial routers to send spam messages. Some malicious URLs include JavaScript that checks for mobile access before delivering harmful content. Connections to a Telegram bot named GroozaBot have also been observed. The
SMS API
is being abused in these attacks.Recommendations
Update Milesight UR5X, UR32L, UR32, UR35, and UR41 routers to version 35.3.0.7 or later.
Restrict access to the
SMS API
to prevent unauthorized use.
Ensure proper configuration of the SMS notification feature to prevent abuse.
Monitor system logs for suspicious activity.
Change default administrator passwords to strong, unique credentials.
Disable the SMS notification feature if it is not required.Exploit
Fix
Information Disclosure
Insertion into Log File
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2023-06558
CVE-2023-43261
Affected Products
Milesight Ur32L
Milesight Ur35
Milesight Ur41
Milesight Ur5X
References · 42
- 🔥 https://github.com/win3zz/CVE-2023-43261⭐ 56 🔗 8 · Exploit
- 🔥 https://medium.com/@win3zz/inside-the-router-how-i-accessed-industrial-routers-and-reported-the-flaws-29c34213dfdf · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2023-43261 · Security Note
- https://bdu.fstec.ru/vul/2023-06558 · Security Note
- https://twitter.com/win3zz/status/1708528262853677174 · Twitter Post
- https://twitter.com/grok/status/1973692254884909546 · Twitter Post
- http://milesight.com · Note
- https://twitter.com/motakasoft/status/1710135310448017703 · Twitter Post
- https://twitter.com/nas_bench/status/1716524633157927196 · Twitter Post
- https://twitter.com/grok/status/1973423483704189430 · Twitter Post
- https://twitter.com/Komodosec/status/1709132717844255178 · Twitter Post
- https://twitter.com/the_yellow_fall/status/1709116585880023488 · Twitter Post
- https://t.me/S_E_Reborn/5942 · Telegram Post
- http://packetstormsecurity.com/files/176988/Milesight-UR5X-UR32L-UR32-UR35-UR41-Credential-Leakage.html · Note
- https://t.me/secharvester/14555 · Telegram Post