Home

Description

Sunway ForceControl version 6.1 SP3 and earlier contains a stack-based buffer overflow vulnerability in the SNMP NetDBServer service, which listens on TCP port 2001. The flaw is triggered when the service receives a specially crafted packet using opcode 0x57 with an overly long payload. Due to improper bounds checking during packet parsing, attacker-controlled data overwrites the Structured Exception Handler (SEH), allowing arbitrary code execution in the context of the service. This vulnerability can be exploited remotely without authentication and may lead to full system compromise on affected Windows hosts.

PUBLISHED Reserved 2025-08-28 | Published 2025-08-30 | Updated 2025-09-02 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unknown

*
affected

Credits

Luigi Auriemma finder

References

raw.githubusercontent.com/...unway_force_control_netdbsrv.rb exploit

www.exploit-db.com/exploits/18448 exploit

www.fortiguard.com/encyclopedia/ips/29449 third-party-advisory

aluigi.altervista.org/adv/forcecontrol_1-adv.txt technical-description exploit

www.sunwayland.com/ product

web.archive.org/...3512/http://www.sunwayland.com.cn/pro.asp product

www.vulncheck.com/...ay-forcecontrol-snmp-netdbserver-opcode third-party-advisory

cve.org (CVE-2011-10032)

nvd.nist.gov (CVE-2011-10032)

Download JSON