Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2011-5245 | NetOp (now part of Impero Software) Remote Control Client v9.5 is vulnerable to a stack-based buffer overflow when processing .dws configuration files. If a .dws file contains a string longer than 520 bytes, the application fails to perform proper bounds checking, allowing an attacker to execute arbitrary code when the file is opened. |
Thu, 20 Nov 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:netop:remote_control:9.5:*:*:*:*:*:*:* |
Fri, 15 Aug 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netop
Netop remote Control |
|
| Vendors & Products |
Netop
Netop remote Control |
Thu, 14 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 Aug 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NetOp (now part of Impero Software) Remote Control Client v9.5 is vulnerable to a stack-based buffer overflow when processing .dws configuration files. If a .dws file contains a string longer than 520 bytes, the application fails to perform proper bounds checking, allowing an attacker to execute arbitrary code when the file is opened. | |
| Title | NetOp Remote Control Client 9.5 .dws File Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:02:03.651Z
Reserved: 2025-08-11T19:39:26.628Z
Link: CVE-2011-10012
Updated: 2025-08-14T13:47:20.707Z
Status : Deferred
Published: 2025-08-13T21:15:28.463
Modified: 2026-04-15T00:35:42.020
Link: CVE-2011-10012
No data.
OpenCVE Enrichment
Updated: 2025-08-14T12:59:54Z
EUVD