To exploit this vulnerability, the attacker sends data from the GotoCmd 
argument to control. If the value of the argument is overly long, the 
static stack buffer can be overflowed. This will allow the attacker to 
execute arbitrary code remotely.
                
            References
                    | Link | Resource | 
|---|---|
| http://webaccess.advantech.com/ | |
| http://www.securityfocus.com/bid/66740 | |
| https://www.cisa.gov/news-events/ics-advisories/icsa-14-079-03 | |
| http://ics-cert.us-cert.gov/advisories/ICSA-14-079-03 | Third Party Advisory US Government Resource | 
| http://www.securityfocus.com/bid/66722 | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    19 Sep 2025, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) To exploit this vulnerability, the attacker sends data from the GotoCmd argument to control. If the value of the argument is overly long, the static stack buffer can be overflowed. This will allow the attacker to execute arbitrary code remotely. | |
| CWE | CWE-121 | |
| References | 
 | 
21 Nov 2024, 02:02
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://ics-cert.us-cert.gov/advisories/ICSA-14-079-03 - Third Party Advisory, US Government Resource | |
| References | () http://www.securityfocus.com/bid/66722 - | 
Information
                Published : 2014-04-12 04:37
Updated : 2025-09-19 20:15
NVD link : CVE-2014-0765
Mitre link : CVE-2014-0765
CVE.ORG link : CVE-2014-0765
JSON object : View
Products Affected
                advantech
- advantech_webaccess
