CVE-2010-20112
CRITICALAmlib's NetOpacs webquery.dll - Buffer Overflow
Title source: llmDescription
Amlib’s NetOpacs webquery.dll contains a stack-based buffer overflow vulnerability triggered by improper handling of HTTP GET parameters. Specifically, the application fails to enforce bounds on input supplied to the app parameter, allowing excessive data to overwrite memory structures including the Structured Exception Handler (SEH). Additionally, malformed parameter names followed by an equals sign may result in unintended control flow behavior. This vulnerability is exposed through IIS and affects legacy Windows deployments
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16793
metasploit
WORKING POC
NORMAL
by aushack · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/amlibweb_webquerydll_app.rb
References (6)
Scores
CVSS v4
9.3
EPSS
0.4816
EPSS Percentile
97.7%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-121
Status
published
Products (1)
Amlib/Amlibweb Library Management System
Published
Aug 21, 2025
Tracked Since
Feb 18, 2026