Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified "On_FC_BINFILE_FCS_*FILE", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
RealFlex RealWin HMI应用程序多个栈缓冲区溢出漏洞
Vulnerability Description
DATAC RealFlex RealWin 2.1(Build 6.1.10.10)及之前版本中的HMI应用程序中存在多个基于栈的缓冲区溢出漏洞。远程攻击者可以借助向910端口发送的多个包中的超长用户名,执行任意代码。这些包有:(1)On_FC_CONNECT_FCS_LOGIN包,特制(2)On_FC_CTAGLIST_FCS_CADDTAG,(3)On_FC_CTAGLIST_FCS_CDELTAG,(4)On_FC_CTAGLIST_FCS_ADDTAGMS,(5)On_FC_RFUSER_FCS
CVSS Information
N/A
Vulnerability Type
N/A