CVE-2010-20112

Amlib's NetOpacs webquery.dll - Buffer Overflow

Title source: llm

Description

Amlib’s NetOpacs webquery.dll contains a stack-based buffer overflow vulnerability triggered by improper handling of HTTP GET parameters. Specifically, the application fails to enforce bounds on input supplied to the app parameter, allowing excessive data to overwrite memory structures including the Structured Exception Handler (SEH). Additionally, malformed parameter names followed by an equals sign may result in unintended control flow behavior. This vulnerability is exposed through IIS and affects legacy Windows deployments

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16793
metasploit WORKING POC NORMAL
by aushack · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/amlibweb_webquerydll_app.rb

Scores

EPSS 0.4816
EPSS Percentile 97.7%

Classification

CWE
CWE-121
Status draft

Timeline

Published Aug 21, 2025
Tracked Since Feb 18, 2026