Description
The NT kernel-mode driver (aka pstrip.sys) 5.0.1.1 and earlier in EnTech Taiwan PowerStrip 3.84 and earlier allows local users to gain privileges via certain IRP parameters in an IOCTL request to \Device\Powerstrip1 that overwrites portions of memory.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by NT Internals · textlocalwindows
https://www.exploit-db.com/exploits/7533
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/32961
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/33249
Exploit x_refsource_misc
http://www.ntinternals.org/ntiadv0810/ntiadv0810.html
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4809
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/7533
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/47532
Scores
EPSS
0.0029
EPSS Percentile
52.6%
Details
CWE
CWE-264
Status
published
Products (50)
entechtaiwan/powerstrip
3.00
entechtaiwan/powerstrip
3.01
entechtaiwan/powerstrip
3.02
entechtaiwan/powerstrip
3.10
entechtaiwan/powerstrip
3.11
entechtaiwan/powerstrip
3.12
entechtaiwan/powerstrip
3.15
entechtaiwan/powerstrip
3.16
entechtaiwan/powerstrip
3.18
entechtaiwan/powerstrip
3.20
... and 40 more
Published
Dec 26, 2008
Tracked Since
Feb 18, 2026