CVE-2013-10036

HIGH

Beetel Connection Manager PCW_BTLINDV1.0.0B04 - Buffer Overflow

Title source: llm
STIX 2.1

Description

A stack-based buffer overflow vulnerability exists in Beetel Connection Manager version PCW_BTLINDV1.0.0B04 when parsing the UserName parameter in the NetConfig.ini configuration file. A crafted .ini file containing an overly long UserName value can overwrite the Structured Exception Handler (SEH), leading to arbitrary code execution when the application processes the file.

Exploits (2)

exploitdb WORKING POC VERIFIED
by metacom · pythonlocalwindows
https://www.exploit-db.com/exploits/28969
metasploit WORKING POC NORMAL
by metacom, wvu · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/beetel_netconfig_ini_bof.rb

Scores

CVSS v4 8.4
EPSS 0.0440
EPSS Percentile 89.0%
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-121
Status published
Products (1)
Beetel Teletech Ltd./Connection Manager PCW_BTLINDV1.0.0B04
Published Jul 31, 2025
Tracked Since Feb 18, 2026