A stack-based buffer overflow vulnerability exists in Beetel Connection Manager version PCW_BTLINDV1.0.0B04 when parsing the UserName parameter in the NetConfig.ini configuration file. A crafted .ini file containing an overly long UserName value can overwrite the Structured Exception Handler (SEH), leading to arbitrary code execution when the application processes the file.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Jul 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Beetel
Beetel connection Manager |
|
| Vendors & Products |
Beetel
Beetel connection Manager |
Thu, 31 Jul 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 31 Jul 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow vulnerability exists in Beetel Connection Manager version PCW_BTLINDV1.0.0B04 when parsing the UserName parameter in the NetConfig.ini configuration file. A crafted .ini file containing an overly long UserName value can overwrite the Structured Exception Handler (SEH), leading to arbitrary code execution when the application processes the file. | |
| Title | Beetel Connection Manager NetConfig.ini Stack-Based Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-31T14:53:39.747Z
Updated: 2025-07-31T18:22:42.331Z
Reserved: 2025-07-30T16:23:02.149Z
Link: CVE-2013-10036
Updated: 2025-07-31T18:22:16.405Z
Status : Awaiting Analysis
Published: 2025-07-31T15:15:33.257
Modified: 2025-07-31T18:42:37.870
Link: CVE-2013-10036
No data.