Vulnerability Description
NetPCLinker 1.0.0.0 contains a buffer overflow vulnerability in the Clients Control Panel DNS/IP field that allows attackers to execute arbitrary shellcode. Attackers can craft a malicious payload in the DNS/IP input to overwrite SEH handlers and execute shellcode when adding a new client.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://sourceforge.net/projects/netpclinker/
- https://www.exploit-db.com/exploits/48680
- https://www.vulncheck.com/advisories/netpclinker-buffer-overflow
FAQ
What is CVE-2019-25232?
CVE-2019-25232 is a vulnerability with a CVSS score of 9.8 (CRITICAL). NetPCLinker 1.0.0.0 contains a buffer overflow vulnerability in the Clients Control Panel DNS/IP field that allows attackers to execute arbitrary shellcode. Attackers can craft a malicious payload in ...
How severe is CVE-2019-25232?
CVE-2019-25232 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-25232?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.