CVE-2015-2097
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
09/03/2015
Last modified:
12/04/2025
Description
Multiple buffer overflows in WebGate Embedded Standard Protocol (WESP) SDK allow remote attackers to execute arbitrary code via unspecified vectors to the (1) LoadImage or (2) LoadImageEx function in the WESPMonitor.WESPMonitorCtrl.1 control, (3) ChangePassword function in the WESPCONFIGLib.UserItem control, Connect function in the (4) WESPSerialPort.WESPSerialPortCtrl.1 or (5) WESPPLAYBACKLib.WESPPlaybackCtrl control, or (6) AddID function in the WESPCONFIGLib.IDList control or a (7) long string to the second argument to the ConnectEx3 function in the WESPPLAYBACKLib.WESPPlaybackCtrl control.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:webgate:webgate_embedded_standard_protocol_sdk:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/131072/WebGate-eDVR-Manager-Stack-Buffer-Overflow.html
- http://seclists.org/fulldisclosure/2015/Feb/90
- http://www.osvdb.org/118893
- http://www.osvdb.org/118896
- http://www.osvdb.org/118902
- http://www.securityfocus.com/bid/72835
- http://www.zerodayinitiative.com/advisories/ZDI-15-059/
- http://www.zerodayinitiative.com/advisories/ZDI-15-062/
- http://www.zerodayinitiative.com/advisories/ZDI-15-068/
- https://www.exploit-db.com/exploits/36505/
- https://www.exploit-db.com/exploits/36602/
- https://www.exploit-db.com/exploits/36607/
- http://packetstormsecurity.com/files/131072/WebGate-eDVR-Manager-Stack-Buffer-Overflow.html
- http://seclists.org/fulldisclosure/2015/Feb/90
- http://www.osvdb.org/118893
- http://www.osvdb.org/118896
- http://www.osvdb.org/118902
- http://www.securityfocus.com/bid/72835
- http://www.zerodayinitiative.com/advisories/ZDI-15-059/
- http://www.zerodayinitiative.com/advisories/ZDI-15-062/
- http://www.zerodayinitiative.com/advisories/ZDI-15-068/
- https://www.exploit-db.com/exploits/36505/
- https://www.exploit-db.com/exploits/36602/
- https://www.exploit-db.com/exploits/36607/



