8
CVSSv3

CVE-2016-8377

Published: 13/02/2017 Updated: 28/10/2021
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
CVSS v3 Base Score: 8 | Impact Score: 5.9 | Exploitability Score: 2.1
VMScore: 605
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

An issue exists in Fatek Automation PLC WinProladder Version 3.11 Build 14701. A stack-based buffer overflow vulnerability exists when the software application connects to a malicious server, resulting in a stack buffer overflow. This causes an exploitable Structured Exception Handler (SEH) overwrite condition that may allow remote code execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fatek plc_winproladder_firmware 3.11

Exploits

require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::TcpServer def initialize(info = {}) super(update_info(info, 'Name' => 'Fatek Automation PLC WinProladder Stack-based Buffer Overflow', 'Description' => %q{ This module exploits a stack based buff ...