Impact
A stack-based buffer overflow exists in the built-in web interface of DiskBoss Enterprise, caused by improper bounds checking on the path component of HTTP GET requests. A remote unauthenticated attacker can send a specially crafted long URI to trigger the overflow, potentially resulting in arbitrary code execution with SYSTEM privileges on Windows hosts.
Affected Systems
The vulnerability affects Flexense DiskBoss Enterprise versions 7.4.28, 7.5.12, and 8.2.14. Users running these versions on Windows operating systems are at risk.
Risk and Exploitability
This flaw has a CVSS score of 10 and an EPSS score of 53%, indicating a very high likelihood of exploitation in the wild. Although it is not listed in the CISA KEV catalog, the high EPSS suggests that attackers are already actively seeking this vulnerability. The attack vector is inferred to be an unauthenticated HTTP GET request to the web interface, which an attacker can craft from anywhere on the network, making it especially dangerous for externally exposed instances.
OpenCVE Enrichment
EUVD