Impact
The flaw is a stack‐based buffer overflow in an exposed API route of Copeland XWEB Pro. An unauthenticated network attacker can send a crafted request that corrupts the stack and forces the application to terminate. The vulnerability is identified as CWE‑787 and does not provide an attacker with arbitrary code execution or elevated privileges, but it can disrupt service availability.
Affected Systems
This issue affects Copeland XWEB 300D PRO, XWEB 500B PRO, and XWEB 500D PRO running firmware versions 1.12.1 or earlier. All models are listed in the vendor’s software update catalog and the corresponding firmware CPEs.
Risk and Exploitability
The CVSS score of 4.3 labels the impact as low, and an EPSS score of less than 1% indicates a very small probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers would need network access to the device and could exploit the API without authentication, but the lack of a privilege escalation path and the infrequent use of the exposed route limit real‑world risk.
OpenCVE Enrichment