CVE-2018-25302
Received Received - Intake
SEH-Based Buffer Overflow in Allok AVI to DVD SVCD VCD Converter

Publication date: 2026-04-29

Last updated on: 2026-04-29

Assigner: VulnCheck

Description
Allok AVI to DVD SVCD VCD Converter 4.0.1217 contains a structured exception handling (SEH) based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string in the License Name field. Attackers can craft a payload with junk data, NSEH bypass, SEH handler address, and shellcode that triggers the overflow when pasted into the License Name field and the Register button is clicked, resulting in code execution.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-29
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
allok avi_to_dvd_svcd_vcd_converter 4.0.1217
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-120 The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

The impact of this vulnerability is that a local attacker can execute arbitrary code on the affected system. This could lead to unauthorized actions such as installing malware, stealing data, or gaining elevated privileges, depending on the attacker's payload.


Can you explain this vulnerability to me?

This vulnerability exists in Allok AVI to DVD SVCD VCD Converter version 4.0.1217 and is a structured exception handling (SEH) based buffer overflow. It allows local attackers to execute arbitrary code by providing a specially crafted malicious string in the License Name field. When the attacker pastes this payload and clicks the Register button, the overflow is triggered, enabling code execution.


Can you explain this vulnerability to me?

CVE-2018-25302 is a structured exception handling (SEH) based buffer overflow vulnerability found in Allok AVI to DVD SVCD VCD Converter version 4.0.1217.

This vulnerability allows local attackers to execute arbitrary code by supplying a specially crafted malicious string in the License Name field.

The exploit payload includes junk data, an NSEH bypass, an SEH handler address, and shellcode. When this payload is pasted into the License Name field and the Register button is clicked, it triggers the buffer overflow, resulting in code execution.


How can this vulnerability impact me? :

This vulnerability can allow a local attacker to execute arbitrary code on the affected system.

Successful exploitation could lead to full control over the application or system, potentially allowing the attacker to install malware, steal data, or disrupt system operations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is triggered locally by pasting a specially crafted malicious string into the License Name field of Allok AVI to DVD SVCD VCD Converter version 4.0.1217 and clicking the Register button. Detection involves identifying attempts to input such malicious payloads into the License Name field.

Since the exploit is local and involves user interaction with the application, network-based detection is limited. Monitoring application logs or user input fields for suspicious or unusually long strings in the License Name field may help detect exploitation attempts.

No specific commands for detection are provided in the available resources.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include preventing untrusted users from accessing the Allok AVI to DVD SVCD VCD Converter version 4.0.1217 application or restricting the ability to input data into the License Name field.

Since the vulnerability requires local interaction, limiting user privileges and avoiding running the application with elevated rights can reduce the risk.

Applying any available patches or updates from the vendor that address this buffer overflow vulnerability is recommended once they become available.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart