This is a functional proof-of-concept exploit for a SEH-based buffer overflow in Network Scanner Version 4.0.0.0. It demonstrates a crash by overwriting the SEH handler with a crafted payload, though it notes challenges in achieving reliable exploitation due to memory constraints and character restrictions.
Classification
Working Poc 95%
Attack Type
Dos
Complexity
Moderate
Reliability
Theoretical
Target:Network Scanner 4.0.0.0
No auth needed
Prerequisites:Access to the 'Detect IP from Host name' input field in the Network Scanner tool