An attacker can exploit this vulnerability by copying an overly long NodeName2 argument into a statically sized buffer on the stack to overflow the static stack buffer. An attacker may use this vulnerability to remotely execute arbitrary code.
https://www.cisa.gov/news-events/ics-advisories/icsa-14-079-03
http://www.securityfocus.com/bid/66740
http://www.securityfocus.com/bid/66725