Home

Description

Control Center PRO 6.2.9 contains a stack-based buffer overflow vulnerability in the user creation module's username field that allows attackers to overwrite Structured Exception Handler (SEH). Attackers can craft a malicious payload exceeding 664 bytes to inject shellcode and potentially execute arbitrary code on vulnerable Windows systems.

PUBLISHED Reserved 2026-02-13 | Published 2026-02-18 | Updated 2026-02-19 | Assigner VulnCheck




HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.4CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Stack-based Buffer Overflow

Product status

6.2.9
affected

Credits

Samir sanchez garnica @sasaga92 finder

References

www.exploit-db.com/exploits/47645 (ExploitDB-47645) exploit

www.webgateinc.com/wgi/eng/products/list.php?ec_idx1=P610 (Vendor Homepage) product

www.webgateinc.com/...type=view&page=&p_idx=90&tab=download& (Software Download Page) product

www.vulncheck.com/...er-pro-local-stack-based-bufferoverflow (VulnCheck Advisory: Control Center PRO 6.2.9 - Local Stack Based BufferOverflow) third-party-advisory

cve.org (CVE-2019-25357)

nvd.nist.gov (CVE-2019-25357)

Download JSON