A stack-based buffer overflow vulnerability exists in Beetel Connection Manager version PCW_BTLINDV1.0.0B04 when parsing the UserName parameter in the NetConfig.ini configuration file. A crafted .ini file containing an overly long UserName value can overwrite the Structured Exception Handler (SEH), leading to arbitrary code execution when the application processes the file.
History

Thu, 31 Jul 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Beetel
Beetel connection Manager
Vendors & Products Beetel
Beetel connection Manager

Thu, 31 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 31 Jul 2025 15:00:00 +0000

Type Values Removed Values Added
Description A stack-based buffer overflow vulnerability exists in Beetel Connection Manager version PCW_BTLINDV1.0.0B04 when parsing the UserName parameter in the NetConfig.ini configuration file. A crafted .ini file containing an overly long UserName value can overwrite the Structured Exception Handler (SEH), leading to arbitrary code execution when the application processes the file.
Title Beetel Connection Manager NetConfig.ini Stack-Based Buffer Overflow
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-07-31T14:53:39.747Z

Updated: 2025-07-31T18:22:42.331Z

Reserved: 2025-07-30T16:23:02.149Z

Link: CVE-2013-10036

cve-icon Vulnrichment

Updated: 2025-07-31T18:22:16.405Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-31T15:15:33.257

Modified: 2025-07-31T18:42:37.870

Link: CVE-2013-10036

cve-icon Redhat

No data.