Impact
The flaw is a structured exception handler buffer overflow in Download Accelerator Plus DAP 10.0.6.0. By crafting a malicious URL that overflows the buffer, an attacker can overwrite SEH pointers and execute arbitrary shellcode when the URL is imported through the application's web page import feature. This vulnerability allows remote attackers to run code with the privileges of the user running the application, compromising confidentiality, integrity, and availability of the machine.
Affected Systems
The affected product is Speedbit Download Accelerator Plus DAP, version 10.0.6.0. No other versions are listed as vulnerable in the available data. Users running earlier or later releases are not identified as affected.
Risk and Exploitability
The severity is reflected in a CVSS score of 9.3, indicating a high‑impact remote code execution risk. The EPSS score is not provided, and the vulnerability is not in the CISA KEV catalog, but the condition of a buffer overflow with an exploitable SEH pointer is widely known to be easy to exploit. Attackers can trigger the flaw by sending a crafted URL to a user who imports it, and no authentication is required, so the attack can be performed remotely with minimal effort. The potential impact is full control over the affected system.
OpenCVE Enrichment