CVE-2014-0773

N/A Unknown
Published: April 12, 2014 Modified: May 06, 2026
View on NVD

Description

The BWOCXRUN.BwocxrunCtrl.1 control contains a method named β€œCreateProcess.” This method contains validation to ensure an attacker cannot run arbitrary command lines. After validation, the values supplied in the HTML are passed to the Windows CreateProcessA API. The validation can be bypassed allowing for running arbitrary command lines. The command line can specify running remote files (example: UNC command line). A function exists at offset 100019B0 of bwocxrun.ocx. Inside this function, there are 3 calls to strstr to check the contents of the user specified command line. If β€œ\setup.exe,” β€œ\bwvbprt.exe,” or β€œ\bwvbprtl.exe” are contained in the command line (strstr returns nonzero value), the command line passes validation and is then passed to CreateProcessA.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://webaccess.advantech.com/
Source: ics-cert@hq.dhs.gov
http://www.securityfocus.com/bid/66740
Source: ics-cert@hq.dhs.gov
http://ics-cert.us-cert.gov/advisories/ICSA-14-079-03
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.4%
60th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

advantech