CVE-2020-37138
Unknown Unknown - Not Provided
Buffer Overflow in 10-Strike Network Inventory Allows RCE

Publication date: 2026-02-05

Last updated on: 2026-02-05

Assigner: VulnCheck

Description
10-Strike Network Inventory Explorer 9.03 contains a buffer overflow vulnerability in the file import functionality that allows remote attackers to execute arbitrary code. Attackers can craft a malicious text file with carefully constructed payload to trigger a stack-based buffer overflow and bypass data execution prevention through a ROP chain.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-05
Last Modified
2026-02-05
Generated
2026-05-07
AI Q&A
2026-02-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
10-strike network_inventory_explorer 9.03
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a buffer overflow in the 10-Strike Network Inventory Explorer version 9.03, specifically in the file import functionality where the software loads a list of computers from a text file.

An attacker can create a specially crafted malicious text file that triggers a stack-based buffer overflow when loaded by the application. This overflow allows the attacker to overwrite the Structured Exception Handler (SEH) and use Return-Oriented Programming (ROP) techniques to bypass Data Execution Prevention (DEP) on Windows systems.

By exploiting this vulnerability, the attacker can execute arbitrary code on the affected system, demonstrated by a proof-of-concept payload that launches the calculator application (calc.exe). The exploit requires local access to run the malicious file within the application.


How can this vulnerability impact me? :

This vulnerability can allow an attacker with local access to execute arbitrary code on your system by loading a maliciously crafted text file into the 10-Strike Network Inventory Explorer software.

Successful exploitation could lead to unauthorized actions such as running malicious programs, potentially compromising system integrity, confidentiality, and availability.

Since the exploit bypasses Data Execution Prevention, it can execute code even on systems with some security mitigations enabled, increasing the risk of compromise.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability is triggered locally by loading a specially crafted text file into the 10-Strike Network Inventory Explorer 9.03 application via the "From Text File" button under the "Computers" tab.'}, {'type': 'paragraph', 'content': 'Detection involves identifying if the vulnerable version (9.03) of 10-Strike Network Inventory Explorer is installed and monitoring for attempts to load suspicious or unusually large text files through the file import functionality.'}, {'type': 'paragraph', 'content': 'Since the exploit uses a crafted TXT file to trigger a buffer overflow, you can check for the presence of such files or monitor application logs for crashes with access violation errors (exception code c0000005) related to the file import process.'}, {'type': 'paragraph', 'content': 'No specific detection commands are provided in the resources, but general steps include:'}, {'type': 'list_item', 'content': 'Verify the installed version of 10-Strike Network Inventory Explorer (e.g., check via Control Panel or software inventory commands).'}, {'type': 'list_item', 'content': 'Monitor application logs or Windows Event Viewer for crashes or exceptions related to NetworkInventoryExplorer.exe.'}, {'type': 'list_item', 'content': 'Scan for suspicious TXT files that might be used to exploit the vulnerability, especially those with unusually large sizes (~5000 bytes) or abnormal content.'}, {'type': 'list_item', 'content': 'Use process monitoring tools (like Sysinternals Process Monitor) to observe file access and application behavior during file imports.'}] [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Avoid loading text files from untrusted or unknown sources into the 10-Strike Network Inventory Explorer 9.03 application.
  • Restrict user permissions to prevent unauthorized users from running or interacting with the vulnerable application.
  • Monitor and block attempts to use the file import functionality with suspicious or crafted TXT files.
  • If possible, upgrade to a patched or newer version of the software that addresses this vulnerability (no patch details are provided in the resources).
  • Implement application whitelisting or sandboxing to limit the impact of potential exploitation.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart