argument to control. If the value of the argument is overly long, the
static stack buffer can be overflowed. This will allow the attacker to
execute arbitrary code remotely.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-0796 | To exploit this vulnerability, the attacker sends data from the GotoCmd argument to control. If the value of the argument is overly long, the static stack buffer can be overflowed. This will allow the attacker to execute arbitrary code remotely. |
Solution
Advantech has created a new version (Version 7.2) that mitigates each of the vulnerabilities described above. Users may download this version from the following location at their web site: http://webaccess.advantech.com/downloads.php?item=software For additional information about WebAccess, please visit the following Advantech web site: http://webaccess.advantech.com/
Workaround
No workaround given by the vendor.
Fri, 19 Sep 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stack-based buffer overflow in Advantech WebAccess before 7.2 allows remote attackers to execute arbitrary code via a long GotoCmd argument. | To exploit this vulnerability, the attacker sends data from the GotoCmd argument to control. If the value of the argument is overly long, the static stack buffer can be overflowed. This will allow the attacker to execute arbitrary code remotely. |
| Title | Advantech WebAccess Stack-based Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-09-19T19:09:15.893Z
Reserved: 2014-01-02T00:00:00
Link: CVE-2014-0765
No data.
Status : Deferred
Published: 2014-04-12T04:37:31.503
Modified: 2025-09-19T20:15:36.003
Link: CVE-2014-0765
No data.
OpenCVE Enrichment
No data.
EUVD