Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary code via a long string in the (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud, or (11) IPAddress parameter to an ActiveX control in (a) webvact.ocx, (b) dvs.ocx, or (c) webdact.ocx.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    06 Oct 2025, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-121 | |
| References | 
 | 
21 Nov 2024, 02:06
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://ics-cert.us-cert.gov/advisories/ICSA-14-198-02 - Third Party Advisory, US Government Resource | |
| References | () http://packetstormsecurity.com/files/128384/Advantech-WebAccess-dvs.ocx-GetColor-Buffer-Overflow.html - Exploit | |
| References | () http://www.securityfocus.com/bid/68714 - Exploit | 
Information
                Published : 2014-07-19 05:09
Updated : 2025-10-06 18:15
NVD link : CVE-2014-2364
Mitre link : CVE-2014-2364
CVE.ORG link : CVE-2014-2364
JSON object : View
Products Affected
                advantech
- advantech_webaccess
