### [CVE-2017-2785](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2785) ![](https://img.shields.io/static/v1?label=Product&message=PopUp%20Printer%20Client&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=9.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=remote%20code%20execution&color=brightgreen) ### Description An exploitable buffer overflow exists in the psnotifyd application of the Pharos PopUp printer client version 9.0. A specially crafted packet can be sent to the victim's computer and can lead to a heap based buffer overflow resulting in remote code execution. This client is always listening, has root privileges, and requires no user interaction to exploit. ### POC #### Reference - http://www.talosintelligence.com/reports/TALOS-2017-0280/ #### Github No PoCs found on GitHub currently.