CVE-2008-5725

EnTech Taiwan PowerStrip <3.84 - Privilege Escalation

Title source: llm
STIX 2.1

Description

The NT kernel-mode driver (aka pstrip.sys) 5.0.1.1 and earlier in EnTech Taiwan PowerStrip 3.84 and earlier allows local users to gain privileges via certain IRP parameters in an IOCTL request to \Device\Powerstrip1 that overwrites portions of memory.

Exploits (1)

exploitdb WORKING POC VERIFIED
by NT Internals · textlocalwindows
https://www.exploit-db.com/exploits/7533

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/32961
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33249
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/4809
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7533
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/47532

Scores

EPSS 0.0029
EPSS Percentile 52.6%

Details

CWE
CWE-264
Status published
Products (50)
entechtaiwan/powerstrip 3.00
entechtaiwan/powerstrip 3.01
entechtaiwan/powerstrip 3.02
entechtaiwan/powerstrip 3.10
entechtaiwan/powerstrip 3.11
entechtaiwan/powerstrip 3.12
entechtaiwan/powerstrip 3.15
entechtaiwan/powerstrip 3.16
entechtaiwan/powerstrip 3.18
entechtaiwan/powerstrip 3.20
... and 40 more
Published Dec 26, 2008
Tracked Since Feb 18, 2026