### [CVE-2016-8377](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8377) ![](https://img.shields.io/static/v1?label=Product&message=Fatek%20Automation%20PLC%20WinProladder%203.11%20Build%2014701&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Fatek%20Automation%20PLC%20WinProladder%20Stack-Based%20Buffer%20Overflow%20Vulnerability&color=brighgreen) ### Description An issue was discovered in Fatek Automation PLC WinProladder Version 3.11 Build 14701. A stack-based buffer overflow vulnerability exists when the software application connects to a malicious server, resulting in a stack buffer overflow. This causes an exploitable Structured Exception Handler (SEH) overwrite condition that may allow remote code execution. ### POC #### Reference - https://www.exploit-db.com/exploits/42700/ - https://www.exploit-db.com/exploits/42700/ #### Github - https://github.com/ARPSyndicate/cvemon