module
Advantech WebAccess Webvrpcs Service Opcode 80061 Stack Buffer Overflow
Disclosed | Created |
---|---|
11/02/2017 | 06/14/2018 |
Disclosed
11/02/2017
Created
06/14/2018
Description
This module exploits a stack buffer overflow in Advantech WebAccess 8.2.
By sending a specially crafted DCERPC request, an attacker could overflow
the buffer and execute arbitrary code.
By sending a specially crafted DCERPC request, an attacker could overflow
the buffer and execute arbitrary code.
Author
mr_me
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:
msf > use exploit/windows/scada/advantech_webaccess_webvrpcs_bof msf /(f) > show actions ...actions... msf /(f) > set ACTION < action-name > msf /(f) > show options ...show and set options... msf /(f) > run

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.