NodeName2 argument into a statically sized buffer on the stack to
overflow the static stack buffer. An attacker may use this vulnerability
to remotely execute arbitrary code.
No analysis available yet.
Vendor Solution
Advantech has created a new version (Version 7.2) that mitigates each of the vulnerabilities described above. Users may download this version from the following location at their web site: http://webaccess.advantech.com/downloads.php?item=software For additional information about WebAccess, please visit the following Advantech web site: http://webaccess.advantech.com/
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-0797 | An attacker can exploit this vulnerability by copying an overly long NodeName2 argument into a statically sized buffer on the stack to overflow the static stack buffer. An attacker may use this vulnerability to remotely execute arbitrary code. |
Fri, 19 Sep 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stack-based buffer overflow in Advantech WebAccess before 7.2 allows remote attackers to execute arbitrary code via a long NodeName2 argument. | An attacker can exploit this vulnerability by copying an overly long NodeName2 argument into a statically sized buffer on the stack to overflow the static stack buffer. An attacker may use this vulnerability to remotely execute arbitrary code. |
| Title | Advantech WebAccess Stack-based Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-09-19T19:10:40.843Z
Reserved: 2014-01-02T00:00:00.000Z
Link: CVE-2014-0766
No data.
Status : Deferred
Published: 2014-04-12T04:37:31.533
Modified: 2025-09-19T20:15:37.000
Link: CVE-2014-0766
No data.
OpenCVE Enrichment
No data.
EUVD