Home

Description

Amlib’s NetOpacs webquery.dll contains a stack-based buffer overflow vulnerability triggered by improper handling of HTTP GET parameters. Specifically, the application fails to enforce bounds on input supplied to the app parameter, allowing excessive data to overwrite memory structures including the Structured Exception Handler (SEH). Additionally, malformed parameter names followed by an equals sign may result in unintended control flow behavior. This vulnerability is exposed through IIS and affects legacy Windows deployments

PUBLISHED Reserved 2025-08-20 | Published 2025-08-21 | Updated 2025-08-22 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unknown

*
affected

Credits

aushack finder

References

raw.githubusercontent.com/...ttp/amlibweb_webquerydll_app.rb exploit

www.exploit-db.com/exploits/16793 exploit

www.fortiguard.com/encyclopedia/ips/24002 third-party-advisory

advisories.checkpoint.com/...public/2013/cpai-2013-1344.html third-party-advisory

www.amlib.co.uk/product/product.aspx?menuId=top_products product

www.vulncheck.com/...amlibweb-netopacs-stack-buffer-overflow third-party-advisory

cve.org (CVE-2010-20112)

nvd.nist.gov (CVE-2010-20112)

Download JSON