vendor:
Sysax
by:
Craig Freyman (@cd1zz)
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Sysax
Affected Version From: <= 5.62
Affected Version To: <= 5.62
Patch Exists: NO
Related CWE:
CPE: a:sysax:sysax:5.62
Platforms Tested: Windows XP SP3 32bit
2012
Sysax <= 5.62 Admin Interface Local Buffer Overflow
This exploit allows an attacker to execute arbitrary code on a vulnerable Sysax <= 5.62 Admin Interface. The vulnerability occurs due to a buffer overflow in the login function. By sending a specially crafted GET request, an attacker can overwrite the return address and gain control of the program execution flow. The exploit payload is a shellcode that creates a bind shell on port 4444.
Mitigation:
Update to a version of Sysax that is not affected by this vulnerability. Patch not available.