Impact
LanSpy 2.0.1.159 contains a local buffer overflow in its scan functionality that allows an attacker who can execute code on the host to submit a crafted payload. By manipulating the structured exception handling chain and using einghunter techniques to locate shellcode, a local attacker can trigger arbitrary code execution with the privileges of the user running LanSpy, potentially compromising the entire system.
Affected Systems
The vulnerability affects the Lizardsystems product LanSpy version 2.0.1.159. No other product versions or vendors are listed as affected.
Risk and Exploitability
The CVSS score of 8.6 categorizes this flaw as high severity. Because the attack requires local access, the EPSS score is not available, but the risk remains significant for systems where LanSpy is run with elevated privileges. The vulnerability is not listed in CISA KEV, but the exploit methodology via SEH manipulation is well known and could be deployed by adversaries with local foothold.
OpenCVE Enrichment