Impact
Smart VPN version 1.1.3.0 includes a buffer overflow in the search interface that can be triggered by an attacker with local access. By submitting an oversized 2100‑character string into the top‑right search bar, the application throws an unhandled exception, causing the process to terminate. This results in a denial of service for the user of the application, but does not provide any compromise of data or privilege escalation.
Affected Systems
The vulnerability affects the Smart VPN product from SmartVPN. The affected version is 1.1.3.0. No other versions are noted in the CNA data.
Risk and Exploitability
The CVSS score is 6.9, indicating a moderate severity. EPSS information is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting that widespread exploitation is not currently known. Exploitation requires local access to the machine running the application. Therefore, the risk is primarily to users with direct access to the vulnerable instance, and an attacker can repeatedly crash the application but cannot gain further privileges or access remote systems.
OpenCVE Enrichment