This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of WebGate eDVR Manager. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WESPMonitor.WESPMonitorCtrl.1 ActiveX control. By providing an invalid IP address to the Connect() method and forcing a page reload, an attacker can cause a pointer to be referenced after it has been freed. An attacker could use this to execute arbitrary code in the context of the browser.