We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34108

Disk Pulse Enterprise 9.0.34 Login Stack Buffer Overflow



Description

A stack-based buffer overflow vulnerability exists in the login functionality of Disk Pulse Enterprise version 9.0.34. An attacker can send a specially crafted HTTP POST request to the /login endpoint with an overly long username parameter, causing a buffer overflow in the libspp.dll component. Successful exploitation allows arbitrary code execution with SYSTEM privileges.

Reserved 2025-04-15 | Published 2025-07-15 | Updated 2025-07-15 | Assigner VulnCheck


HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

CWE-20 Improper Input Validation

Product status

Default status
unknown

9.0.34
affected

Credits

Tulpa Security finder

References

raw.githubusercontent.com/...tp/disk_pulse_enterprise_bof.rb exploit

www.exploit-db.com/exploits/40452 exploit

vulners.com/...PLOIT-WINDOWS-HTTP-DISK_PULSE_ENTERPRISE_BOF- exploit

advisories.checkpoint.com/...ublic/2017/cpai-2017-0006.html/ third-party-advisory

www.vulncheck.com/...-enterprise-login-stack-buffer-overflow

cve.org (CVE-2025-34108)

nvd.nist.gov (CVE-2025-34108)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34108

Support options

Helpdesk Chat, Email, Knowledgebase