A stack-based buffer overflow vulnerability exists in the login functionality of Disk Pulse Enterprise version 9.0.34. An attacker can send a specially crafted HTTP POST request to the /login endpoint with an overly long username parameter, causing a buffer overflow in the libspp.dll component. Successful exploitation allows arbitrary code execution with SYSTEM privileges.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00204}


Tue, 15 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 15 Jul 2025 13:15:00 +0000

Type Values Removed Values Added
Description A stack-based buffer overflow vulnerability exists in the login functionality of Disk Pulse Enterprise version 9.0.34. An attacker can send a specially crafted HTTP POST request to the /login endpoint with an overly long username parameter, causing a buffer overflow in the libspp.dll component. Successful exploitation allows arbitrary code execution with SYSTEM privileges.
Title Disk Pulse Enterprise 9.0.34 Login Stack Buffer Overflow
Weaknesses CWE-121
CWE-20
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-07-15T13:40:16.922Z

Reserved: 2025-04-15T19:15:22.560Z

Link: CVE-2025-34108

cve-icon Vulnrichment

Updated: 2025-07-15T13:40:11.265Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-15T13:15:30.527

Modified: 2025-07-15T20:07:28.023

Link: CVE-2025-34108

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.