An attacker can exploit this vulnerability by copying an overly long
NodeName2 argument into a statically sized buffer on the stack to
overflow the static stack buffer. An attacker may use this vulnerability
to remotely execute arbitrary code.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-0797 An attacker can exploit this vulnerability by copying an overly long NodeName2 argument into a statically sized buffer on the stack to overflow the static stack buffer. An attacker may use this vulnerability to remotely execute arbitrary code.
Fixes

Solution

Advantech has created a new version (Version 7.2) that mitigates each of the vulnerabilities described above. Users may download this version from the following location at their web site:  http://webaccess.advantech.com/downloads.php?item=software For additional information about WebAccess, please visit the following Advantech web site:  http://webaccess.advantech.com/


Workaround

No workaround given by the vendor.

History

Fri, 19 Sep 2025 19:30:00 +0000

Type Values Removed Values Added
Description Stack-based buffer overflow in Advantech WebAccess before 7.2 allows remote attackers to execute arbitrary code via a long NodeName2 argument. An attacker can exploit this vulnerability by copying an overly long NodeName2 argument into a statically sized buffer on the stack to overflow the static stack buffer. An attacker may use this vulnerability to remotely execute arbitrary code.
Title Advantech WebAccess Stack-based Buffer Overflow
Weaknesses CWE-121
References

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-19T19:10:40.843Z

Reserved: 2014-01-02T00:00:00

Link: CVE-2014-0766

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-04-12T04:37:31.533

Modified: 2025-09-19T20:15:37.000

Link: CVE-2014-0766

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.