Description
Easyboot 6.6.0 contains a buffer overflow vulnerability in the Replace Text function that allows local attackers to crash the application by supplying an oversized string. Attackers can trigger the vulnerability by accessing File > Tools > Replace Text and pasting a 7000-byte payload into the text fields to cause a denial of service.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Gionathan Reale · pythondoswindows_x86
https://www.exploit-db.com/exploits/45241
Scores
CVSS v3
6.2
EPSS
0.0001
EPSS Percentile
1.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-120
Status
published
Products (1)
Ezbsystems/Easyboot
6.6.0
Published
Apr 26, 2026
Tracked Since
Apr 26, 2026