To exploit this vulnerability, the attacker sends data from the GotoCmd
argument to control. If the value of the argument is overly long, the
static stack buffer can be overflowed. This will allow the attacker to
execute arbitrary code remotely.
References
Link | Resource |
---|---|
http://webaccess.advantech.com/ | |
http://www.securityfocus.com/bid/66740 | |
https://www.cisa.gov/news-events/ics-advisories/icsa-14-079-03 | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-079-03 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/66722 |
Configurations
Configuration 1 (hide)
|
History
19 Sep 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) To exploit this vulnerability, the attacker sends data from the GotoCmd argument to control. If the value of the argument is overly long, the static stack buffer can be overflowed. This will allow the attacker to execute arbitrary code remotely. | |
References |
|
|
CWE | CWE-121 |
21 Nov 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://ics-cert.us-cert.gov/advisories/ICSA-14-079-03 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/66722 - |
Information
Published : 2014-04-12 04:37
Updated : 2025-09-19 20:15
NVD link : CVE-2014-0765
Mitre link : CVE-2014-0765
CVE.ORG link : CVE-2014-0765
JSON object : View
Products Affected
advantech
- advantech_webaccess