Impact
Verypdf docPrint Pro 8.0 contains a structured exception handling (SEH) buffer overflow that is triggered by supplying an oversized alphanumeric encoded payload in the User Password or Master Password fields. The overflow allows an attacker to overwrite the SEH and inject malicious shellcode, resulting in arbitrary local code execution. The weakness is a classic buffer overflow (CWE-787).
Affected Systems
The affected product is Verypdf:docPrint Pro 8.0. The vulnerability is triggered when processing the User Password or Master Password fields. No other versions are listed as affected in the available data.
Risk and Exploitability
The CVSS score of 8.6 indicates a high severity, while the EPSS score of less than 1% suggests a low probability of widespread exploitation in the wild. The exploit requires local access to the application and crafting of a specific payload; therefore the likely attack vector is local. The vulnerability is not listed in CISA’s KEV catalog, but the combination of its severity and local nature warrants proactive mitigation.
OpenCVE Enrichment