First published: Sat Apr 12 2014(Updated: )
Stack-based buffer overflow in Advantech WebAccess before 7.2 allows remote attackers to execute arbitrary code via a long GotoCmd argument.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech WebOP | <=7.1 | |
Advantech WebOP | =5.0 | |
Advantech WebOP | =6.0 | |
Advantech WebOP | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0765 is rated as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2014-0765, upgrade Advantech WebAccess to version 7.2 or later.
CVE-2014-0765 can be exploited via a stack-based buffer overflow caused by a long GotoCmd argument.
Advantech WebAccess versions prior to 7.2 and certain versions including 5.0, 6.0, and 7.0 are affected by CVE-2014-0765.
CVE-2014-0765 allows remote attackers to execute arbitrary code on vulnerable systems, potentially leading to total system compromise.