NodeName2 argument into a statically sized buffer on the stack to
overflow the static stack buffer. An attacker may use this vulnerability
to remotely execute arbitrary code.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-0797 | An attacker can exploit this vulnerability by copying an overly long NodeName2 argument into a statically sized buffer on the stack to overflow the static stack buffer. An attacker may use this vulnerability to remotely execute arbitrary code. |
Solution
Advantech has created a new version (Version 7.2) that mitigates each of the vulnerabilities described above. Users may download this version from the following location at their web site: http://webaccess.advantech.com/downloads.php?item=software For additional information about WebAccess, please visit the following Advantech web site: http://webaccess.advantech.com/
Workaround
No workaround given by the vendor.
Fri, 19 Sep 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stack-based buffer overflow in Advantech WebAccess before 7.2 allows remote attackers to execute arbitrary code via a long NodeName2 argument. | An attacker can exploit this vulnerability by copying an overly long NodeName2 argument into a statically sized buffer on the stack to overflow the static stack buffer. An attacker may use this vulnerability to remotely execute arbitrary code. |
| Title | Advantech WebAccess Stack-based Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-09-19T19:10:40.843Z
Reserved: 2014-01-02T00:00:00
Link: CVE-2014-0766
No data.
Status : Deferred
Published: 2014-04-12T04:37:31.533
Modified: 2025-09-19T20:15:37.000
Link: CVE-2014-0766
No data.
OpenCVE Enrichment
No data.
EUVD