This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the 0x1138a IOCTL in the webvrpcs process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of Administrator.
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech WebOP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-19-589 is categorized as a high severity vulnerability due to its capability to allow remote code execution without authentication.
To fix ZDI-19-589, it is recommended to apply the latest security patches provided by Advantech for the WebAccess software.
ZDI-19-589 is a remote code execution vulnerability affecting Advantech WebAccess Node installations.
Users of Advantech WebAccess who have not applied relevant updates are at risk from the ZDI-19-589 vulnerability.
No, authentication is not required to exploit the ZDI-19-589 vulnerability, making it particularly dangerous.