A stack based buffer overflow exists in an API route of XWEB Pro version
1.12.1 and prior, enabling unauthenticated attackers to cause stack
corruption and a termination of the program.

Project Subscriptions

Vendors Products
Copeland Subscribe
Copeland Xweb 300d Pro Subscribe
Copeland Xweb 500b Pro Subscribe
Copeland Xweb 500d Pro Subscribe
Advisories

No advisories yet.

Fixes

Solution

Copeland has provided a fix for the vulnerabilities and recommends users update the XWEB Pro to the latest version by going to their software update page https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate in the sections dedicated to the different XWEBPRO models page.


Workaround

No workaround given by the vendor.

History

Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Copeland
Copeland copeland Xweb 300d Pro
Copeland copeland Xweb 500b Pro
Copeland copeland Xweb 500d Pro
Vendors & Products Copeland
Copeland copeland Xweb 300d Pro
Copeland copeland Xweb 500b Pro
Copeland copeland Xweb 500d Pro

Fri, 27 Feb 2026 01:30:00 +0000

Type Values Removed Values Added
Description A stack based buffer overflow exists in an API route of XWEB Pro version 1.12.1 and prior, enabling unauthenticated attackers to cause stack corruption and a termination of the program.
Title Copeland XWEB and XWEB Pro Stack-based Buffer Overflow
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-02-27T01:03:18.783Z

Reserved: 2026-02-05T16:47:16.578Z

Link: CVE-2026-20797

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-27T02:16:18.343

Modified: 2026-02-27T14:06:37.987

Link: CVE-2026-20797

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-27T09:02:53Z

Weaknesses

No weakness.