10-Strike Network Inventory Explorer 8.54 contains a stack-based buffer overflow vulnerability in the registration key input field that allows local attackers to execute arbitrary code by triggering a structured exception handler overwrite. Attackers can craft a malicious registration key string with 4188 bytes of padding followed by SEH chain values and shellcode, then paste it into the registration dialog to achieve code execution with application privileges.
History

Sat, 23 May 2026 18:45:00 +0000

Type Values Removed Values Added
Description 10-Strike Network Inventory Explorer 8.54 contains a stack-based buffer overflow vulnerability in the registration key input field that allows local attackers to execute arbitrary code by triggering a structured exception handler overwrite. Attackers can craft a malicious registration key string with 4188 bytes of padding followed by SEH chain values and shellcode, then paste it into the registration dialog to achieve code execution with application privileges.
Title 10-Strike Network Inventory Explorer 8.54 Buffer Overflow SEH
First Time appeared 10-strike
10-strike network Inventory Explorer
Weaknesses CWE-121
CPEs cpe:2.3:a:10-strike:network_inventory_explorer:-:*:*:*:*:*:*:*
cpe:2.3:a:10-strike:network_inventory_explorer:8.54:*:*:*:*:*:*:*
cpe:2.3:a:10-strike:network_inventory_explorer:9.31:*:*:*:pro:*:*:*
cpe:2.3:a:10-strike:network_inventory_explorer:9.3:*:*:*:*:*:*:*
Vendors & Products 10-strike
10-strike network Inventory Explorer
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-05-23T18:30:46.677Z

Updated: 2026-05-23T18:30:46.677Z

Reserved: 2026-05-23T14:45:41.616Z

Link: CVE-2018-25344

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.