Description
LanSpy 2.0.1.159 contains a local buffer overflow vulnerability in the scan section that allows local attackers to execute arbitrary code by exploiting structured exception handling mechanisms. Attackers can craft malicious payloads using egghunter techniques to locate and execute shellcode, triggering code execution through SEH chain manipulation and controlled jumps.
Published: 2026-04-22
Score: 8.6 High
EPSS: n/a
KEV: No
Impact: Local Code Execution
Action: Immediate Patch
AI Analysis

Impact

LanSpy 2.0.1.159 contains a local buffer overflow in its scan functionality that allows an attacker who can execute code on the host to submit a crafted payload. By manipulating the structured exception handling chain and using einghunter techniques to locate shellcode, a local attacker can trigger arbitrary code execution with the privileges of the user running LanSpy, potentially compromising the entire system.

Affected Systems

The vulnerability affects the Lizardsystems product LanSpy version 2.0.1.159. No other product versions or vendors are listed as affected.

Risk and Exploitability

The CVSS score of 8.6 categorizes this flaw as high severity. Because the attack requires local access, the EPSS score is not available, but the risk remains significant for systems where LanSpy is run with elevated privileges. The vulnerability is not listed in CISA KEV, but the exploit methodology via SEH manipulation is well known and could be deployed by adversaries with local foothold.

Generated by OpenCVE AI on April 22, 2026 at 18:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LanSpy to the latest version that addresses the buffer overflow, if a patch or newer release is available from Lizardsystems.
  • Run LanSpy under the lowest privilege level necessary and restrict local user rights to prevent uncontrolled execution of malicious payloads.
  • Disable or uninstall LanSpy if it is not required for business operations, and monitor system logs for signs of SEH chain manipulation or unexpected shellcode execution.

Generated by OpenCVE AI on April 22, 2026 at 18:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description LanSpy 2.0.1.159 contains a local buffer overflow vulnerability in the scan section that allows local attackers to execute arbitrary code by exploiting structured exception handling mechanisms. Attackers can craft malicious payloads using egghunter techniques to locate and execute shellcode, triggering code execution through SEH chain manipulation and controlled jumps.
Title LanSpy 2.0.1.159 Local Buffer Overflow
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-22T15:39:37.494Z

Reserved: 2026-04-22T14:20:56.883Z

Link: CVE-2018-25265

cve-icon Vulnrichment

Updated: 2026-04-22T15:39:33.756Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-22T16:16:46.907

Modified: 2026-04-22T21:23:52.620

Link: CVE-2018-25265

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T18:30:23Z

Weaknesses