CVE-2011-10012
NetOp Remote Control Client 9.5 .dws File Buffer Overflow
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
NetOp (now part of Impero Software) Remote Control Client v9.5 is vulnerable to a stack-based buffer overflow when processing .dws configuration files. If a .dws file contains a string longer than 520 bytes, the application fails to perform proper bounds checking, allowing an attacker to execute arbitrary code when the file is opened.
| CWE | CWE-121 |
| Vendor | netop |
| Product | remote control client |
| Published | Aug 13, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for netop remote control client
Be the first to know when new unknown vulnerabilities affecting netop remote control client are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
NetOp / Remote Control Client
9.5
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/netop.rb exploit-db.com: https://www.exploit-db.com/exploits/17223 exploit-db.com: https://www.exploit-db.com/exploits/18697 fortiguard.com: https://www.fortiguard.com/encyclopedia/ips/27765/netop-remote-control-dws-file-handling-buffer-overflow netop.com: https://netop.com/ web.archive.org: https://web.archive.org/web/20120314075913/https://codework-systems.com/netop-remotecontrol-10-01-released/ vulncheck.com: https://www.vulncheck.com/advisories/netop-remote-control-client-dws-file-buffer-overflow
Credits
Ruben Alejandro "chap0"