CVE-2011-10032

critical

Description

Sunway ForceControl version 6.1 SP3 and earlier contains a stack-based buffer overflow vulnerability in the SNMP NetDBServer service, which listens on TCP port 2001. The flaw is triggered when the service receives a specially crafted packet using opcode 0x57 with an overly long payload. Due to improper bounds checking during packet parsing, attacker-controlled data overwrites the Structured Exception Handler (SEH), allowing arbitrary code execution in the context of the service. This vulnerability can be exploited remotely without authentication and may lead to full system compromise on affected Windows hosts.

References

https://www.vulncheck.com/advisories/sunway-forcecontrol-snmp-netdbserver-opcode

https://www.fortiguard.com/encyclopedia/ips/29449

https://www.exploit-db.com/exploits/18448

https://web.archive.org/web/20110611043512/http://www.sunwayland.com.cn/pro.asp

https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/scada/sunway_force_control_netdbsrv.rb

http://www.sunwayland.com/

http://aluigi.altervista.org/adv/forcecontrol_1-adv.txt

Details

Source: Mitre, NVD

Published: 2025-08-30

Updated: 2025-08-30

Risk Information

CVSS v2

Base Score: 9.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

CVSS v4

Base Score: 9.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Severity: Critical

EPSS

EPSS: 0.00284