Description
NetSchedScan 1.0 contains a buffer overflow vulnerability in the scan Hostname/IP field that allows local attackers to crash the application by supplying an oversized input string. Attackers can paste a crafted payload containing 388 bytes of data followed by 4 bytes of EIP overwrite into the Hostname/IP field to trigger a denial of service condition.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Abraham Espinosa · pythondoswindows
https://www.exploit-db.com/exploits/39242
Scores
CVSS v3
6.2
EPSS
0.0002
EPSS Percentile
3.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-787
Status
published
Products (2)
Foundstone/NetSchedScan
1.0
mcafee/netschedscan
1.0
Published
Apr 04, 2026
Tracked Since
Apr 04, 2026