An attacker may exploit this vulnerability by passing an overly long
value from the AccessCode argument to the control. This will overflow
the static stack buffer. The attacker may then execute code on the
target device remotely.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-0798 An attacker may exploit this vulnerability by passing an overly long value from the AccessCode argument to the control. This will overflow the static stack buffer. The attacker may then execute code on the target device remotely.
Fixes

Solution

Advantech has created a new version (Version 7.2) that mitigates each of the vulnerabilities described above. Users may download this version from the following location at their web site:  http://webaccess.advantech.com/downloads.php?item=software For additional information about WebAccess, please visit the following Advantech web site:  http://webaccess.advantech.com/


Workaround

No workaround given by the vendor.

History

Fri, 19 Sep 2025 19:30:00 +0000

Type Values Removed Values Added
Description Stack-based buffer overflow in Advantech WebAccess before 7.2 allows remote attackers to execute arbitrary code via a long AccessCode argument. An attacker may exploit this vulnerability by passing an overly long value from the AccessCode argument to the control. This will overflow the static stack buffer. The attacker may then execute code on the target device remotely.
Title Advantech WebAccess Stack-based Buffer Overflow
Weaknesses CWE-121
References

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-19T19:11:31.813Z

Reserved: 2014-01-02T00:00:00

Link: CVE-2014-0767

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-04-12T04:37:31.567

Modified: 2025-09-19T20:15:37.177

Link: CVE-2014-0767

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.