Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-0765


To exploit this vulnerability, the attacker sends data from the GotoCmd argument to control. If the value of the argument is overly long, the static stack buffer can be overflowed. This will allow the attacker to execute arbitrary code remotely.


Published

2014-04-12T04:37:31.503

Last Modified

2025-09-19T20:15:36.003

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-121
  • Type: Secondary
    CWE-119

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application advantech advantech_webaccess ≤ 7.1 Yes
Application advantech advantech_webaccess 5.0 Yes
Application advantech advantech_webaccess 6.0 Yes
Application advantech advantech_webaccess 7.0 Yes

References