vendor:
RTL CPL
by:
BraniX
7,5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: RTL CPL
Affected Version From: 1.1.1.6
Affected Version To: 1.1.1.6
Patch Exists: NO
Related CWE: N/A
CPE: a:rtl_software:rtl_cpl
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3 Home Edition
2010
RTLCPL 1.1.1.6 – Exploit
A classic buffer overflow vulnerability can be triggered by passing a too long argument as a startup parameter. Shellcode can by run via classic ret overwrite or SEH Handler overwrite.
Mitigation:
Input validation and proper sanitization of user input should be done to prevent buffer overflow attacks.