Impact
The vulnerability is a stack-based buffer overflow triggered by an excessively long username in a login request. The overflow occurs in the libspp.dll component when processing the /login HTTP endpoint, allowing an attacker to overwrite control data and execute arbitrary code with SYSTEM privileges. This capability yields full compromise of the affected system.
Affected Systems
Falconstor Software’s Disk Pulse Enterprise, version 9.0.34, is affected.
Risk and Exploitability
The CVSS score of 8.6 and an EPSS of 58% indicate a high likelihood of exploitation. This is a remote exploitation scenario, where an attacker can remotely target the web application by sending a crafted POST request. An active exploit is available in Metasploit, confirming that attackers can achieve local privilege escalation to SYSTEM. The vulnerability is not listed in CISA KEV, but its severity and exploitability remain high.
OpenCVE Enrichment
EUVD