VIPA Automation WinPLC7 5.0.45.5921 Buffer Overflow
Posted by deepcore on September 15, 2017 – 8:54 am
This Metasploit module exploits a stack based buffer overflow found in VIPA Automation WinPLC7 versions 5.0.45.5921 and below. The overflow is triggered when WinPLC7 connects to a remote server and accepts a malicious packet. The first 2 bytes of this packet are read in and used as the size value for a later recv function. If a size value of sufficiently large size is supplied a stack buffer overflow will occur
Post a reply
You must be logged in to post a comment.