without proper sanitization. The DBVisitor.dll is exposed through SOAP
interfaces, and the exposed functions are vulnerable to SOAP injection.
This may allow unexpected SQL action and access to records in the table
of the software database or execution of arbitrary code.
No analysis available yet.
Vendor Solution
Advantech has created a new version (Version 7.2) that mitigates each of the vulnerabilities described above. Users may download this version from the following location at their web site: http://webaccess.advantech.com/downloads.php?item=software For additional information about WebAccess, please visit the following Advantech web site: http://webaccess.advantech.com/
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 19 Sep 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Multiple SQL injection vulnerabilities in DBVisitor.dll in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary SQL commands via SOAP requests to unspecified functions. | An attacker using SQL injection may use arguments to construct queries without proper sanitization. The DBVisitor.dll is exposed through SOAP interfaces, and the exposed functions are vulnerable to SOAP injection. This may allow unexpected SQL action and access to records in the table of the software database or execution of arbitrary code. |
| Title | Advantech WebAccess SQL Injection | |
| References |
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-09-19T19:06:29.062Z
Reserved: 2014-01-02T00:00:00.000Z
Link: CVE-2014-0763
No data.
Status : Deferred
Published: 2014-04-12T04:37:31.440
Modified: 2025-09-19T19:15:37.537
Link: CVE-2014-0763
No data.
OpenCVE Enrichment
No data.