CVE-2014-0773
Severity CVSS v4.0:
Pending analysis
Type:
CWE-77
Command Injection
Publication date:
12/04/2014
Last modified:
19/09/2025
Description
The BWOCXRUN.BwocxrunCtrl.1 control contains a method named <br />
“CreateProcess.” This method contains validation to ensure an attacker <br />
cannot run arbitrary command lines. After validation, the values <br />
supplied in the HTML are passed to the Windows CreateProcessA API.<br />
<br />
<br />
The validation can be bypassed allowing for running arbitrary command<br />
lines. The command line can specify running remote files (example: UNC <br />
command line).<br />
<br />
<br />
A function exists at offset 100019B0 of bwocxrun.ocx. Inside this <br />
function, there are 3 calls to strstr to check the contents of the user <br />
specified command line. If “\setup.exe,” “\bwvbprt.exe,” or <br />
“\bwvbprtl.exe” are contained in the command line (strstr returns <br />
nonzero value), the command line passes validation and is then passed to<br />
CreateProcessA.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:* | 7.1 (including) | |
| cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:advantech:advantech_webaccess:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:advantech:advantech_webaccess:7.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



