CVE-2014-0765

To exploit this vulnerability, the attacker sends data from the GotoCmd argument to control. If the value of the argument is overly long, the static stack buffer can be overflowed. This will allow the attacker to execute arbitrary code remotely.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:*
cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*
cpe:2.3:a:advantech:advantech_webaccess:6.0:*:*:*:*:*:*:*
cpe:2.3:a:advantech:advantech_webaccess:7.0:*:*:*:*:*:*:*

History

19 Sep 2025, 20:15

Type Values Removed Values Added
Summary (en) Stack-based buffer overflow in Advantech WebAccess before 7.2 allows remote attackers to execute arbitrary code via a long GotoCmd argument. (en) To exploit this vulnerability, the attacker sends data from the GotoCmd argument to control. If the value of the argument is overly long, the static stack buffer can be overflowed. This will allow the attacker to execute arbitrary code remotely.
References
  • () http://webaccess.advantech.com/ -
  • () http://www.securityfocus.com/bid/66740 -
  • () https://www.cisa.gov/news-events/ics-advisories/icsa-14-079-03 -
CWE CWE-121

21 Nov 2024, 02:02

Type Values Removed Values Added
References () http://ics-cert.us-cert.gov/advisories/ICSA-14-079-03 - Third Party Advisory, US Government Resource () http://ics-cert.us-cert.gov/advisories/ICSA-14-079-03 - Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/66722 - () http://www.securityfocus.com/bid/66722 -

Information

Published : 2014-04-12 04:37

Updated : 2025-09-19 20:15


NVD link : CVE-2014-0765

Mitre link : CVE-2014-0765

CVE.ORG link : CVE-2014-0765


JSON object : View

Products Affected

advantech

  • advantech_webaccess
CWE
CWE-121

Stack-based Buffer Overflow

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer