The BWOCXRUN.BwocxrunCtrl.1 control contains a method named 
“CreateProcess.” This method contains validation to ensure an attacker 
cannot run arbitrary command lines. After validation, the values 
supplied in the HTML are passed to the Windows CreateProcessA API.
The validation can be bypassed allowing for running arbitrary command
 lines. The command line can specify running remote files (example: UNC 
command line).
A function exists at offset 100019B0 of bwocxrun.ocx. Inside this 
function, there are 3 calls to strstr to check the contents of the user 
specified command line. If “\setup.exe,” “\bwvbprt.exe,” or 
“\bwvbprtl.exe” are contained in the command line (strstr returns 
nonzero value), the command line passes validation and is then passed to
 CreateProcessA.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    19 Sep 2025, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) The BWOCXRUN.BwocxrunCtrl.1 control contains a method named “CreateProcess.” This method contains validation to ensure an attacker cannot run arbitrary command lines. After validation, the values supplied in the HTML are passed to the Windows CreateProcessA API. The validation can be bypassed allowing for running arbitrary command lines. The command line can specify running remote files (example: UNC command line). A function exists at offset 100019B0 of bwocxrun.ocx. Inside this function, there are 3 calls to strstr to check the contents of the user specified command line. If “\setup.exe,” “\bwvbprt.exe,” or “\bwvbprtl.exe” are contained in the command line (strstr returns nonzero value), the command line passes validation and is then passed to CreateProcessA. | |
| References | 
 | |
| CWE | CWE-77 | 
21 Nov 2024, 02:02
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://ics-cert.us-cert.gov/advisories/ICSA-14-079-03 - US Government Resource | 
Information
                Published : 2014-04-12 04:37
Updated : 2025-09-19 20:15
NVD link : CVE-2014-0773
Mitre link : CVE-2014-0773
CVE.ORG link : CVE-2014-0773
JSON object : View
Products Affected
                advantech
- advantech_webaccess
CWE
                
                    
                        
                        CWE-77
                        
            Improper Neutralization of Special Elements used in a Command ('Command Injection')
NVD-CWE-Other