๐Ÿ” CVE Alert

CVE-2011-10012

UNKNOWN 0.0

NetOp Remote Control Client 9.5 .dws File Buffer Overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

NetOp (now part of Impero Software) Remote Control Client v9.5 is vulnerable to a stack-based buffer overflow when processing .dws configuration files. If a .dws file contains a string longer than 520 bytes, the application fails to perform proper bounds checking, allowing an attacker to execute arbitrary code when the file is opened.

CWE CWE-121
Vendor netop
Product remote control client
Published Aug 13, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for netop remote control client

Be the first to know when new unknown vulnerabilities affecting netop remote control client are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

NetOp / Remote Control Client
9.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/netop.rb exploit-db.com: https://www.exploit-db.com/exploits/17223 exploit-db.com: https://www.exploit-db.com/exploits/18697 fortiguard.com: https://www.fortiguard.com/encyclopedia/ips/27765/netop-remote-control-dws-file-handling-buffer-overflow netop.com: https://netop.com/ web.archive.org: https://web.archive.org/web/20120314075913/https://codework-systems.com/netop-remotecontrol-10-01-released/ vulncheck.com: https://www.vulncheck.com/advisories/netop-remote-control-client-dws-file-buffer-overflow

Credits

Ruben Alejandro "chap0"