Impact
The vulnerability is a stack-based buffer overflow on a host name field. By supplying a specially crafted value, defenders can override SafeSEH protection and run arbitrary code. The flaw is triggered when the user invokes the Trace route or System information functions, both of which parse the host name or address input.
Affected Systems
10‑Strike Network Scanner 3.0. No specific patch version is listed; users should verify the current installation is 3.0 or later and confirm that the overflow fix has been applied.
Risk and Exploitability
The CVSS score of 8.6 indicates a high severity risk. No EPSS score is available, but a public exploit exists on exploit‑db. The issue is not tagged in CISA’s KEV catalog. Attackers need local access to the scanner and to trigger the vulnerable functions, making it a local privilege escalation to code execution scenario.
OpenCVE Enrichment