Impact
The vulnerability in VPN Browser+ 1.1.0.0 allows an unauthenticated user to trigger a denial of service by submitting an oversized search query. The input is not properly validated, causing an unhandled exception that crashes the application. As a result, users lose the ability to use the application and may lose VPN connectivity until the program is restarted.
Affected Systems
VPN Browser+ version 1.1.0.0 is affected. The issue originates from the search functionality of this specific version; no other product versions are listed as impacted.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity. No EPSS score is provided, and the vulnerability is not listed in the CISA KEV catalog. Because authentication is not required, the flaw is trivially reachable from any user accessing the application. Attacking the search box with a large string is likely the exploitation path and can be performed without privileged access.
OpenCVE Enrichment