Impact
NetSetMan 4.7.1 includes a buffer overflow in the Workgroup feature that lets a local attacker craft a configuration file with excessive data and paste it into the Workgroup field, causing the application to crash. The consequence is a denial‑of‑service condition for any user running the program, with no elevation of privilege or data exposure.
Affected Systems
The vulnerability affects NetSetMan’s NetSetMan product, specifically the 4.7.1 build and potentially earlier pro releases such as 4.0.0 through 5.0.0 as indicated by the CPE list. The attack requires local access to the machine where the application is installed.
Risk and Exploitability
With a CVSS score of 6.9, the vulnerability is rated as moderately severe. The EPSS score is not available, and it is not listed in the CISA KEV catalog. Attackers need local presence to supply the oversized Workgroup input; thus the exploit path is straightforward but limited to the local user context. Once triggered, the application terminates, disrupting service for all local users.
OpenCVE Enrichment