Impact
Faleemi Desktop Software version 1.8 contains a local stack buffer overflow in the System Setup dialog. By injecting a crafted payload into the Save Path for Snapshot and Record file field, an attacker can trigger the overflow and bypass Data Execution Prevention protections via structured exception handling. The vulnerability enables execution of arbitrary code through a return‑oriented programming chain, allowing a local user to run code with the privileges of the application.
Affected Systems
The issue affects the 1.8 release of Faleemi Desktop Software. No specific patch information is included in the advisory, so users must install the latest version released by the vendor to eliminate the flaw.
Risk and Exploitability
The CVSS score of 8.6 indicates high severity. The vulnerability is local, requiring that the attacker has access to the affected machine and can manipulate the System Setup dialog. No EPSS score or KEV listing suggests it has not been widely observed in the wild. If exploited, an attacker could gain complete control of the local system, elevating or maintaining privileges as permitted by the application context.
OpenCVE Enrichment