to the control to overflow the static stack buffer. The attacker may
then remotely execute arbitrary code.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-0799 | An attacker may pass an overly long value from the AccessCode2 argument to the control to overflow the static stack buffer. The attacker may then remotely execute arbitrary code. |
Solution
Advantech has created a new version (Version 7.2) that mitigates each of the vulnerabilities described above. Users may download this version from the following location at their web site: http://webaccess.advantech.com/downloads.php?item=software For additional information about WebAccess, please visit the following Advantech web site: http://webaccess.advantech.com/
Workaround
No workaround given by the vendor.
Fri, 19 Sep 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stack-based buffer overflow in Advantech WebAccess before 7.2 allows remote attackers to execute arbitrary code via a long AccessCode2 argument. | An attacker may pass an overly long value from the AccessCode2 argument to the control to overflow the static stack buffer. The attacker may then remotely execute arbitrary code. |
| Title | Advantech WebAccess Stack-based Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-09-19T19:12:29.569Z
Reserved: 2014-01-02T00:00:00
Link: CVE-2014-0768
No data.
Status : Deferred
Published: 2014-04-12T04:37:31.597
Modified: 2025-09-19T20:15:37.343
Link: CVE-2014-0768
No data.
OpenCVE Enrichment
No data.
EUVD