CVE-2020-37075
Published: 03 February 2026
Description
LanSend 3.2 contains a buffer overflow vulnerability in the Add Computers Wizard file import functionality that allows remote attackers to execute arbitrary code. Attackers can craft a malicious payload file to trigger a structured exception handler (SEH) overwrite and execute…
more
shellcode when importing computers from a file.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the buffer overflow flaw in LanSend 3.2's file import functionality through timely patching.
Validates imported files in the Add Computers Wizard to block malicious payloads that trigger buffer overflows.
Provides memory protections such as DEP and ASLR to thwart SEH overwrite and shellcode execution from buffer overflows.
Security SummaryAI
CVE-2020-37075 is a buffer overflow vulnerability (CWE-120) affecting LanSend version 3.2, specifically in the Add Computers Wizard file import functionality. The flaw enables remote attackers to execute arbitrary code by crafting a malicious payload file that triggers a structured exception handler (SEH) overwrite, leading to shellcode execution when the file is imported.
Attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). An unauthenticated remote attacker can achieve full remote code execution on the target system running the vulnerable software.
Advisories and related resources, including a proof-of-concept exploit on Exploit-DB (https://www.exploit-db.com/exploits/48461) and a VulnCheck advisory (https://www.vulncheck.com/advisories/lansend-buffer-overflow-seh), detail the issue. The vendor product page is available at https://lizardsystems.com/lansend/.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The buffer overflow vulnerability in LanSend's file import functionality directly enables arbitrary code execution via a crafted malicious file, mapping to Exploitation for Client Execution (T1203).