Stack-based buffer overflow in WECON LeviStudioU and PI Studio HMI - CVE-2018-7527
Published: April 26, 2018 / Updated: May 1, 2018
WECON LeviStudioU
PI Studio HMI
Detailed vulnerability description
The vulnerability allows a remote unauthenticated attacker to execute arbitrary code on the target system.
The weakness exists due to stack-based buffer overflow when handling malicious input. A remote attacker can trick the victim into opening a specially crafted file, trigger memory corruption and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.