An attacker can exploit this vulnerability by copying an overly long
NodeName2 argument into a statically sized buffer on the stack to
overflow the static stack buffer. An attacker may use this vulnerability
to remotely execute arbitrary code.

Project Subscriptions

Vendors Products
Advantech Subscribe
Advantech Webaccess Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2014-0797 An attacker can exploit this vulnerability by copying an overly long NodeName2 argument into a statically sized buffer on the stack to overflow the static stack buffer. An attacker may use this vulnerability to remotely execute arbitrary code.
Fixes

Solution

Advantech has created a new version (Version 7.2) that mitigates each of the vulnerabilities described above. Users may download this version from the following location at their web site:  http://webaccess.advantech.com/downloads.php?item=software For additional information about WebAccess, please visit the following Advantech web site:  http://webaccess.advantech.com/


Workaround

No workaround given by the vendor.

History

Fri, 19 Sep 2025 19:30:00 +0000

Type Values Removed Values Added
Description Stack-based buffer overflow in Advantech WebAccess before 7.2 allows remote attackers to execute arbitrary code via a long NodeName2 argument. An attacker can exploit this vulnerability by copying an overly long NodeName2 argument into a statically sized buffer on the stack to overflow the static stack buffer. An attacker may use this vulnerability to remotely execute arbitrary code.
Title Advantech WebAccess Stack-based Buffer Overflow
Weaknesses CWE-121
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-19T19:10:40.843Z

Reserved: 2014-01-02T00:00:00

Link: CVE-2014-0766

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-04-12T04:37:31.533

Modified: 2025-09-19T20:15:37.000

Link: CVE-2014-0766

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses