Description
A stack-based buffer overflow vulnerability exists in Beetel Connection Manager version PCW_BTLINDV1.0.0B04 when parsing the UserName parameter in the NetConfig.ini configuration file. A crafted .ini file containing an overly long UserName value can overwrite the Structured Exception Handler (SEH), leading to arbitrary code execution when the application processes the file.
Problem types
CWE-121 Stack-based Buffer Overflow
Product status
PCW_BTLINDV1.0.0B04
Credits
metacom
References
raw.githubusercontent.com/...mat/beetel_netconfig_ini_bof.rb
www.exploit-db.com/exploits/28969
www.fortiguard.com/...ger-netconfig-username-buffer-overflow
www.vulncheck.com/...ion-manager-stack-based-buffer-overflow