5
CVSSv2

CVE-2017-5177

Published: 19/05/2017 Updated: 16/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A Stack Buffer Overflow issue exists in VIPA Controls WinPLC7 5.0.45.5921 and prior. A stack-based buffer overflow vulnerability has been identified, where an attacker with a specially crafted packet could overflow the fixed length buffer. This could allow remote code execution.

Vulnerable Product Search on Vulmon Subscribe to Product

vipa_controls winplc7_firmware

Exploits

require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::TcpServer def initialize(info = {}) super(update_info(info, 'Name' => 'VIPA Authomation WinPLC7 recv Stack Buffer Overflow', 'Description' => %q{ This module exploits a stack based buffer overflo ...