We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A stack-based buffer overflow vulnerability exists in the login functionality of Disk Pulse Enterprise version 9.0.34. An attacker can send a specially crafted HTTP POST request to the /login endpoint with an overly long username parameter, causing a buffer overflow in the libspp.dll component. Successful exploitation allows arbitrary code execution with SYSTEM privileges.
Reserved 2025-04-15 | Published 2025-07-15 | Updated 2025-07-15 | Assigner VulnCheckCWE-121 Stack-based Buffer Overflow
CWE-20 Improper Input Validation
Tulpa Security
raw.githubusercontent.com/...tp/disk_pulse_enterprise_bof.rb
www.exploit-db.com/exploits/40452
vulners.com/...PLOIT-WINDOWS-HTTP-DISK_PULSE_ENTERPRISE_BOF-
advisories.checkpoint.com/...ublic/2017/cpai-2017-0006.html/
www.vulncheck.com/...-enterprise-login-stack-buffer-overflow
Support options