Impact
X‑NetStat Pro 5.63 implements a 264‑byte buffer that can be overflowed, allowing a local attacker to overwrite the EIP register. By injecting shellcode into memory and using an egg hunter strategy, the attacker can cause the application to execute arbitrary instructions, leading to a complete compromise of the affected system. This vulnerability can be leveraged to read, modify or delete data, gain escalated privileges, or disrupt the service by terminating it. The weakness is classified as a classic buffer overflow (CWE‑787).
Affected Systems
The product affected is Freshsoftware NetStat Pro version 5.63. No other versions are mentioned as vulnerable, and no additional vendor or product information is provided beyond the cited CNA entry.
Risk and Exploitability
With a CVSS score of 8.6 the flaw is in the high severity range. The absence of an EPSS score and lack of inclusion in the CISA KEV catalog reduce certainty about current exploit activity, but an exploit is available in the public domain (Exploit‑DB ID 46596). The attack requires local access or the ability to deliver malicious input to the application’s HTTP Client or Rules processing components, making it exploitable by users with sufficient privileges or an attacker who can perform social engineering to gain a local shell. Given its high severity and the availability of a known exploit, a timely fix is warranted.
OpenCVE Enrichment