Description
A stack based buffer overflow exists in an API route of XWEB Pro version
1.12.1 and prior, enabling unauthenticated attackers to cause stack
corruption and a termination of the program.
Published: 2026-02-27
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via stack overflow
Action: Apply Patch
AI Analysis

Impact

The flaw is a stack‐based buffer overflow in an exposed API route of Copeland XWEB Pro. An unauthenticated network attacker can send a crafted request that corrupts the stack and forces the application to terminate. The vulnerability is identified as CWE‑787 and does not provide an attacker with arbitrary code execution or elevated privileges, but it can disrupt service availability.

Affected Systems

This issue affects Copeland XWEB 300D PRO, XWEB 500B PRO, and XWEB 500D PRO running firmware versions 1.12.1 or earlier. All models are listed in the vendor’s software update catalog and the corresponding firmware CPEs.

Risk and Exploitability

The CVSS score of 4.3 labels the impact as low, and an EPSS score of less than 1% indicates a very small probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers would need network access to the device and could exploit the API without authentication, but the lack of a privilege escalation path and the infrequent use of the exposed route limit real‑world risk.

Generated by OpenCVE AI on April 17, 2026 at 14:06 UTC.

Remediation

Vendor Solution

Copeland has provided a fix for the vulnerabilities and recommends users update the XWEB Pro to the latest version by going to their software update page https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate in the sections dedicated to the different XWEBPRO models page.


OpenCVE Recommended Actions

  • Update XWEB Pro to the latest firmware available on Copeland’s software update page or via the SYSTEM > Updates | Network menu if the device has external connectivity.
  • If a firmware update cannot be applied immediately, restrict inbound traffic to the XWEB Pro’s API endpoints using a local firewall or access control list to block unauthenticated requests.
  • Enable logging and monitoring of API traffic to detect attempts to exploit the buffer overflow, and review logs regularly for anomalous activity.

Generated by OpenCVE AI on April 17, 2026 at 14:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Copeland xweb 300d Pro
Copeland xweb 300d Pro Firmware
Copeland xweb 500b Pro
Copeland xweb 500b Pro Firmware
Copeland xweb 500d Pro
Copeland xweb 500d Pro Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:copeland:xweb_300d_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:copeland:xweb_500b_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:copeland:xweb_500d_pro:-:*:*:*:*:*:*:*
cpe:2.3:o:copeland:xweb_300d_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:copeland:xweb_500b_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:copeland:xweb_500d_pro_firmware:*:*:*:*:*:*:*:*
Vendors & Products Copeland xweb 300d Pro
Copeland xweb 300d Pro Firmware
Copeland xweb 500b Pro
Copeland xweb 500b Pro Firmware
Copeland xweb 500d Pro
Copeland xweb 500d Pro Firmware

Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Copeland
Copeland copeland Xweb 300d Pro
Copeland copeland Xweb 500b Pro
Copeland copeland Xweb 500d Pro
Vendors & Products Copeland
Copeland copeland Xweb 300d Pro
Copeland copeland Xweb 500b Pro
Copeland copeland Xweb 500d Pro

Fri, 27 Feb 2026 01:30:00 +0000

Type Values Removed Values Added
Description A stack based buffer overflow exists in an API route of XWEB Pro version 1.12.1 and prior, enabling unauthenticated attackers to cause stack corruption and a termination of the program.
Title Copeland XWEB and XWEB Pro Stack-based Buffer Overflow
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Copeland Copeland Xweb 300d Pro Copeland Xweb 500b Pro Copeland Xweb 500d Pro Xweb 300d Pro Xweb 300d Pro Firmware Xweb 500b Pro Xweb 500b Pro Firmware Xweb 500d Pro Xweb 500d Pro Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-03-02T14:25:33.427Z

Reserved: 2026-02-05T16:47:16.578Z

Link: CVE-2026-20797

cve-icon Vulnrichment

Updated: 2026-03-02T14:25:29.811Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T02:16:18.343

Modified: 2026-02-27T23:10:35.547

Link: CVE-2026-20797

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:15:21Z

Weaknesses