CVE-2018-25290
Received Received - Intake
Buffer Overflow in Easyboot 6.6.0 Replace Text Causes DoS

Publication date: 2026-04-26

Last updated on: 2026-04-26

Assigner: VulnCheck

Description
Easyboot 6.6.0 contains a buffer overflow vulnerability in the Replace Text function that allows local attackers to crash the application by supplying an oversized string. Attackers can trigger the vulnerability by accessing File > Tools > Replace Text and pasting a 7000-byte payload into the text fields to cause a denial of service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-26
Last Modified
2026-04-26
Generated
2026-05-07
AI Q&A
2026-04-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
easyboot easyboot 6.6.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-120 The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is triggered locally by using the Replace Text function in Easyboot 6.6.0 with an oversized string. Detection involves verifying if the application is vulnerable by attempting to reproduce the crash with a large payload in the Replace Text fields.

Since the vulnerability requires local interaction and specific application usage, network-based detection commands are not applicable.

No specific commands or automated detection methods are provided.


Can you explain this vulnerability to me?

This vulnerability exists in Easyboot version 6.6.0 within the Replace Text function. It is a buffer overflow issue that allows local attackers to crash the application by providing an oversized string.

Specifically, an attacker can trigger the vulnerability by navigating to File > Tools > Replace Text and pasting a payload of about 7000 bytes into the text fields, which causes the application to crash.


How can this vulnerability impact me? :

The primary impact of this vulnerability is a denial of service (DoS) condition. By exploiting the buffer overflow, an attacker can cause the Easyboot application to crash, disrupting normal operations.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, avoid using the Replace Text function with oversized strings in Easyboot 6.6.0.

Restrict local access to the application to trusted users only to prevent exploitation.

Monitor for application updates or patches from the vendor that address this buffer overflow vulnerability and apply them as soon as they become available.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart