The zero-day was exploited in April and May in 2009. It is unclear if vendor has ever issued a patch.
Vulnerable component: Storm
CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
CWE-ID: CWE-121 - Stack-based Buffer Overflow
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to stack-based buffer overflow in ActiveX control (Config.dll). A remote attacker can create a specially crafted Web page that passes an overly long string to the SetAttributeValue() method, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the system with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: the vulnerability was being actively exploited.
- BaoFeng - 'config.dll' ActiveX Remote Code Execution [Exploit-DB]
Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.