module
Beetel Connection Manager NetConfig.ini Buffer Overflow
Disclosed | Created |
---|---|
2013-10-12 | 2018-05-30 |
Disclosed
2013-10-12
Created
2018-05-30
Description
This module exploits a stack-based buffer overflow in Beetel Connection
Manager. The vulnerability exists in the parsing of the UserName
parameter in the NetConfig.ini file.
The module has been tested successfully against version
PCW_BTLINDV1.0.0B04 on Windows XP SP3 and Windows 7 SP1.
Manager. The vulnerability exists in the parsing of the UserName
parameter in the NetConfig.ini file.
The module has been tested successfully against version
PCW_BTLINDV1.0.0B04 on Windows XP SP3 and Windows 7 SP1.
Authors
metacom
wvu wvu@metasploit.com
wvu wvu@metasploit.com
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.