


Perceptive Security
SOC/SIEM Consultancy

LanSpy 2.0.1.159 contains a local buffer overflow vulnerability that allows attackers to overwrite the instruction pointer by supplying oversized input to the s…
Published:
21 april 2026 om 22:00:00
Alert date:
22 april 2026 om 17:03:04
Source:
nvd.nist.gov
Security Tools
LanSpy version 2.0.1.159 contains a critical local buffer overflow vulnerability in the scan field that allows attackers to overwrite the instruction pointer. The vulnerability can be exploited by supplying oversized input consisting of 688 bytes of padding followed by 4 bytes of controlled data. This exploitation technique can lead to application crashes or potentially achieve arbitrary code execution. The vulnerability represents a significant security risk for systems running the affected version of LanSpy. Multiple proof-of-concept exploits and advisories are available documenting the technical details of this buffer overflow.
Technical details
Mitigation steps:
Affected products:
LanSpy
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2018-25268
https://lizardsystems.com
https://www.exploit-db.com/exploits/45968
https://www.vulncheck.com/advisories/lanspy-local-buffer-overflow-via-scan-field
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
