Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary code via a long string in the (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud, or (11) IPAddress parameter to an ActiveX control in (a) webvact.ocx, (b) dvs.ocx, or (c) webdact.ocx.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
Advantech released a new WebAccess Installation Package v7.2 on June 6, 2014, that removes some vulnerable ActiveX components and resolves the vulnerabilities within others. The download link for v7.2 is available at: http://webaccess.advantech.com/
Workaround
No workaround given by the vendor.
References
History
Mon, 06 Oct 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Advantech WebAccess Stack-Based Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-10-06T17:52:36.174Z
Reserved: 2014-03-13T00:00:00
Link: CVE-2014-2364

No data.

Status : Deferred
Published: 2014-07-19T05:09:27.563
Modified: 2025-10-06T18:15:47.890
Link: CVE-2014-2364

No data.

No data.