Description
A heap-based buffer overflow vulnerability exists in the vpnserver WpcParsePacket() functionality of SoftEther VPN 4.41-9782-beta, 5.01.9674 and 5.02. A specially crafted network packet can lead to arbitrary code execution. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.
References (3)
Core 3
Core References
Exploit, Third Party Advisory
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1735
Patch, Vendor Advisory
https://www.softether.org/9-about/News/904-SEVPN202301
Third Party Advisory
https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1735
Scores
CVSS v3
9.0
EPSS
0.0043
EPSS Percentile
62.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-122
CWE-787
Status
published
Products (3)
softether/vpn
4.41-9782 beta
softether/vpn
5.01.9674
softether/vpn
5.02
Published
Oct 12, 2023
Tracked Since
Feb 18, 2026