CVE-2010-20112
Amlib's NetOpacs webquery.dll - Buffer Overflow
Title source: llmDescription
Amlib’s NetOpacs webquery.dll contains a stack-based buffer overflow vulnerability triggered by improper handling of HTTP GET parameters. Specifically, the application fails to enforce bounds on input supplied to the app parameter, allowing excessive data to overwrite memory structures including the Structured Exception Handler (SEH). Additionally, malformed parameter names followed by an equals sign may result in unintended control flow behavior. This vulnerability is exposed through IIS and affects legacy Windows deployments
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16793
metasploit
WORKING POC
NORMAL
by aushack · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/amlibweb_webquerydll_app.rb
References (6)
Scores
EPSS
0.4816
EPSS Percentile
97.7%
Classification
CWE
CWE-121
Status
draft
Timeline
Published
Aug 21, 2025
Tracked Since
Feb 18, 2026