CVE-2015-2097 in Embedded Standard Protocol Sdk
Summary
Multiple buffer overflows in WebGate Embedded Standard Protocol (WESP) SDK allow remote attackers to execute arbitrary code via unspecified vectors to the (1) LoadImage or (2) LoadImageEx function in the WESPMonitor.WESPMonitorCtrl.1 control, (3) ChangePassword function in the WESPCONFIGLib.UserItem control, Connect function in the (4) WESPSerialPort.WESPSerialPortCtrl.1 or (5) WESPPLAYBACKLib.WESPPlaybackCtrl control, or (6) AddID function in the WESPCONFIGLib.IDList control or a (7) long string to the second argument to the ConnectEx3 function in the WESPPLAYBACKLib.WESPPlaybackCtrl control.
VulDB is the best source for vulnerability data and more expert information about this specific topic.
Reservation
02/26/2015
Disclosure
03/09/2015
Status
Confirmed
Entries
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerability | CWE | Exp | Cou | CVE |
|---|---|---|---|---|---|
| 74381 | Webgate Embedded Standard Protocol Sdk WESPCONFIGLib.UserItem ConnectEx3 memory corruption | 119 | Proof-of-Concept | Not defined | CVE-2015-2097 |