LanSpy 2.0.1.159 contains a local buffer overflow vulnerability in the scan section that allows local attackers to execute arbitrary code by exploiting structured exception handling mechanisms. Attackers can craft malicious payloads using egghunter techniques to locate and execute shellcode, triggering code execution through SEH chain manipulation and controlled jumps.
References
| Link | Resource |
|---|---|
| https://lizardsystems.com | Product |
| https://www.exploit-db.com/exploits/46018 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/lanspy-local-buffer-overflow | Third Party Advisory |
Configurations
History
27 Apr 2026, 17:28
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://lizardsystems.com - Product | |
| References | () https://www.exploit-db.com/exploits/46018 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/lanspy-local-buffer-overflow - Third Party Advisory | |
| First Time |
Lizardsystems
Lizardsystems lanspy |
|
| CPE | cpe:2.3:a:lizardsystems:lanspy:*:*:*:*:*:*:*:* |
22 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-22 16:16
Updated : 2026-04-27 17:28
NVD link : CVE-2018-25265
Mitre link : CVE-2018-25265
CVE.ORG link : CVE-2018-25265
JSON object : View
Products Affected
lizardsystems
- lanspy
CWE
CWE-787
Out-of-bounds Write
