Vulnerability & Exploit Database

Back to search

Advantech WebAccess Webvrpcs Service Opcode 80061 Stack Buffer Overflow

This module exploits a stack buffer overflow in Advantech WebAccess 8.2. By sending a specially crafted DCERPC request, an attacker could overflow the buffer and execute arbitrary code.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/windows/scada/advantech_webaccess_webvrpcs_bof

Authors

  • mr_me <mr_me [at] offensive-security.com>

References

Targets

  • Windows 7 x86 - Advantech WebAccess 8.2-2017.03.31

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/scada/advantech_webaccess_webvrpcs_bof msf exploit(advantech_webaccess_webvrpcs_bof) > show targets ...targets... msf exploit(advantech_webaccess_webvrpcs_bof) > set TARGET <target-id> msf exploit(advantech_webaccess_webvrpcs_bof) > show options ...show and set options... msf exploit(advantech_webaccess_webvrpcs_bof) > exploit