Amlib’s NetOpacs webquery.dll contains a stack-based buffer overflow vulnerability triggered by improper handling of HTTP GET parameters. Specifically, the application fails to enforce bounds on input supplied to the app parameter, allowing excessive data to overwrite memory structures including the Structured Exception Handler (SEH). Additionally, malformed parameter names followed by an equals sign may result in unintended control flow behavior. This vulnerability is exposed through IIS and affects legacy Windows deployments
CVSS
No CVSS.
References
Configurations
No configuration.
History
22 Aug 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/amlibweb_webquerydll_app.rb - | |
References | () https://www.exploit-db.com/exploits/16793 - | |
Summary |
|
21 Aug 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-21 20:15
Updated : 2025-08-22 18:08
NVD link : CVE-2010-20112
Mitre link : CVE-2010-20112
CVE.ORG link : CVE-2010-20112
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow