🔐 CVE Alert

CVE-2013-10036

UNKNOWN 0.0

Beetel Connection Manager NetConfig.ini Stack-Based Buffer Overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

A stack-based buffer overflow vulnerability exists in Beetel Connection Manager version PCW_BTLINDV1.0.0B04 when parsing the UserName parameter in the NetConfig.ini configuration file. A crafted .ini file containing an overly long UserName value can overwrite the Structured Exception Handler (SEH), leading to arbitrary code execution when the application processes the file.

CWE CWE-121
Vendor beetel teletech ltd.
Product connection manager
Published Jul 31, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for beetel teletech ltd. connection manager

Be the first to know when new unknown vulnerabilities affecting beetel teletech ltd. connection manager are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Beetel Teletech Ltd. / Connection Manager
PCW_BTLINDV1.0.0B04

References

NVD ↗ CVE.org ↗ EPSS Data ↗
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/beetel_netconfig_ini_bof.rb exploit-db.com: https://www.exploit-db.com/exploits/28969 fortiguard.com: https://www.fortiguard.com/encyclopedia/ips/37394/beetel-connection-manager-netconfig-username-buffer-overflow vulncheck.com: https://www.vulncheck.com/advisories/beetel-connection-manager-stack-based-buffer-overflow

Credits

metacom