漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified "On_FC_BINFILE_FCS_*FILE", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910.
漏洞信息
N/A
漏洞
N/A
漏洞
RealFlex RealWin HMI应用程序多个栈缓冲区溢出漏洞
漏洞信息
DATAC RealFlex RealWin 2.1(Build 6.1.10.10)及之前版本中的HMI应用程序中存在多个基于栈的缓冲区溢出漏洞。远程攻击者可以借助向910端口发送的多个包中的超长用户名,执行任意代码。这些包有:(1)On_FC_CONNECT_FCS_LOGIN包,特制(2)On_FC_CTAGLIST_FCS_CADDTAG,(3)On_FC_CTAGLIST_FCS_CDELTAG,(4)On_FC_CTAGLIST_FCS_ADDTAGMS,(5)On_FC_RFUSER_FCS
漏洞信息
N/A
漏洞
N/A