Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lizardsystems
Lizardsystems lanspy |
|
| CPEs | cpe:2.3:a:lizardsystems:lanspy:2.0.1.159:*:*:*:*:*:*:* | |
| Vendors & Products |
Lizardsystems
Lizardsystems lanspy |
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LanSpy 2.0.1.159 contains a local buffer overflow vulnerability that allows attackers to overwrite the instruction pointer by supplying oversized input to the scan field. Attackers can craft a payload with 688 bytes of padding followed by 4 bytes of controlled data to crash the application or potentially achieve code execution. | |
| Title | LanSpy 2.0.1.159 Local Buffer Overflow via Scan Field | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-22T15:41:19.726Z
Reserved: 2026-04-22T14:28:01.361Z
Link: CVE-2018-25268
Updated: 2026-04-22T15:41:08.925Z
Status : Analyzed
Published: 2026-04-22T16:16:47.397
Modified: 2026-04-27T17:25:43.533
Link: CVE-2018-25268
No data.
OpenCVE Enrichment
Updated: 2026-04-27T20:21:01Z