Home

Description

10-Strike Network Inventory Explorer 8.54 contains a structured exception handler buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting SEH records. Attackers can craft a malicious payload targeting the 'Computer' parameter during the 'Add' function to trigger remote code execution.

PUBLISHED Reserved 2026-02-03 | Published 2026-02-05 | Updated 2026-02-05 | Assigner VulnCheck




HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.4CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Stack-based Buffer Overflow

Product status

8.54
affected

Credits

Felipe Winsnes finder

References

www.exploit-db.com/exploits/48253 (ExploitDB-48253) exploit

www.10-strike.com/ (10-Strike Software Homepage) product

web.archive.org/...-Structered-Exception-Handling-Overwrite/ (Archived Researcher Blog) technical-description exploit

www.vulncheck.com/...-explorer-add-local-buffer-overflow-seh (VulnCheck Advisory: 10-Strike Network Inventory Explorer 8.54 - 'Add' Local Buffer Overflow (SEH)) third-party-advisory

cve.org (CVE-2020-37142)

nvd.nist.gov (CVE-2020-37142)

Download JSON