CVE-2008-1055

SurgeMail < 38k4 and WebMail < 3.1s - Remote Code Execution via Format String in Page Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-1055. PoCs published by Luigi Auriemma.

AI-analyzed exploit summary The provided text describes a remote format-string vulnerability in SurgeMail and WebMail applications, which can lead to arbitrary code execution or denial of service due to improper input sanitization. It references CVE-2008-1055 and includes affected versions but lacks actual exploit code.

Description

Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Luigi Auriemma · textdoswindows
https://www.exploit-db.com/exploits/31300

The provided text describes a remote format-string vulnerability in SurgeMail and WebMail applications, which can lead to arbitrary code execution or denial of service due to improper input sanitization. It references CVE-2008-1055 and includes affected versions but lacks actual exploit code.

Classification
Writeup 90%
Attack Type
Rce
Complexity
Moderate
Reliability
Theoretical
Target: SurgeMail 38k4, beta 39a and earlier; Netwin WebMail 3.1s and earlier
No auth needed
Prerequisites: Network access to the vulnerable application
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (9)

Core 9
Core References
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3705
Third Party Advisory x_refsource_misc
http://aluigi.altervista.org/adv/surgemailz-adv.txt
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29137
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29105
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/0678
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1019500
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/488741/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/40833
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/27990

Scores

EPSS 0.2140
EPSS Percentile 95.8%

Details

CWE
CWE-134
Status published
Products (25)
netwin/surgemail 1.8a
netwin/surgemail 1.8b3
netwin/surgemail 1.8d
netwin/surgemail 1.8e
netwin/surgemail 1.8g3
netwin/surgemail 1.9
netwin/surgemail 1.9b2
netwin/surgemail 2.0a2
netwin/surgemail 2.0c
netwin/surgemail 2.0e
... and 15 more
Published Feb 27, 2008
Tracked Since Feb 18, 2026