Promotic SCADA SaveCfg ActiveX Buffer Overflow Exploit

PROMOTIC SCADA suffers from an ActiveX stack overflow. The exploit is triggered when the SaveCfg() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a web server waiting for vulnerable clients (Internet Explorer 6 or 7) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Exploit Platform
Exploit Type
Product Name