Critical severityNVD Advisory· Published Aug 21, 2025· Updated Apr 15, 2026
CVE-2010-20112
CVE-2010-20112
Description
Amlib’s NetOpacs webquery.dll contains a stack-based buffer overflow vulnerability triggered by improper handling of HTTP GET parameters. Specifically, the application fails to enforce bounds on input supplied to the app parameter, allowing excessive data to overwrite memory structures including the Structured Exception Handler (SEH). Additionally, malformed parameter names followed by an equals sign may result in unintended control flow behavior. This vulnerability is exposed through IIS and affects legacy Windows deployments
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- advisories.checkpoint.com/defense/advisories/public/2013/cpai-2013-1344.htmlnvd
- raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/amlibweb_webquerydll_app.rbnvd
- www.amlib.co.uk/product/product.aspxnvd
- www.exploit-db.com/exploits/16793nvd
- www.fortiguard.com/encyclopedia/ips/24002nvd
- www.vulncheck.com/advisories/amlibweb-netopacs-stack-buffer-overflownvd
News mentions
0No linked articles in our index yet.