top of page
perceptive_background_267k.jpg

LanSpy 2.0.1.159 contains a local buffer overflow vulnerability that allows attackers to overwrite the instruction pointer by supplying oversized input to the s…

Published:

21 April 2026 at 22:00:00

Alert date:

22 April 2026 at 17:03:04

Source:

nvd.nist.gov

Click to open the original link from this advisory

Security Tools

LanSpy version 2.0.1.159 contains a critical local buffer overflow vulnerability in the scan field that allows attackers to overwrite the instruction pointer. The vulnerability can be exploited by supplying oversized input consisting of 688 bytes of padding followed by 4 bytes of controlled data. This exploitation technique can lead to application crashes or potentially achieve arbitrary code execution. The vulnerability represents a significant security risk for systems running the affected version of LanSpy. Multiple proof-of-concept exploits and advisories are available documenting the technical details of this buffer overflow.

Technical details

Mitigation steps:

Affected products:

LanSpy

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page