CVE-2018-25292
Received Received - Intake
Buffer Overflow in Bome Restorator 1793 Causes DoS

Publication date: 2026-04-26

Last updated on: 2026-04-26

Assigner: VulnCheck

Description
Bome Restorator 1793 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Name field. Attackers can create a malicious payload exceeding 4000 bytes and paste it into the Name input field to trigger an application crash and denial of service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-26
Last Modified
2026-04-26
Generated
2026-05-06
AI Q&A
2026-04-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bome restorator 1793
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-120 The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

Bome Restorator 1793 contains a buffer overflow vulnerability that can be triggered by local attackers. This happens when an attacker supplies an excessively long string in the Name field of the application.

By creating a malicious payload exceeding 4000 bytes and pasting it into the Name input field, the attacker can cause the application to crash.

This vulnerability leads to a denial of service condition by crashing the application.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing a local attacker to crash the Bome Restorator application.

The crash results in a denial of service, meaning the application becomes unavailable or unusable until it is restarted or fixed.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves a buffer overflow triggered by supplying an excessively long string in the Name field of Bome Restorator 1793. Detection would involve monitoring for application crashes or denial of service events caused by unusually long input strings.

Since the vulnerability is local and triggered by input to the application, network detection is limited. On the system, you can check for application crashes or logs indicating failure when processing long Name field inputs.

No specific commands or detection tools are provided in the available information.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves preventing local attackers from supplying excessively long strings in the Name field to Bome Restorator 1793.

Restrict local user access to the application to trusted users only.

Monitor and limit input lengths where possible to avoid triggering the buffer overflow.

No specific patches or updates are mentioned in the provided information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart