CVE-2019-25660
Buffer Overflow in LanHelper 1.74 Causes Application Crash
Publication date: 2026-04-05
Last updated on: 2026-04-20
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hainsoft | lanhelper | to 1.74 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
LanHelper version 1.74 has a local buffer overflow vulnerability. This means that the application does not properly handle very long input strings, specifically in the Form Send Message feature. An attacker can exploit this by pasting 6000 bytes of data into the Message text field, which causes the application to crash.
How can this vulnerability impact me? :
This vulnerability can be used by an attacker to cause a denial of service (DoS) condition by crashing the LanHelper application. This means the application will stop functioning properly, potentially disrupting normal operations.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding the use of the Form Send Message feature with excessively long input strings to prevent triggering the buffer overflow.
Restrict user input length in the Message text field to less than 6000 bytes.
Apply any available patches or updates from the vendor once released.
Monitor the application for crashes or denial of service conditions and restrict access to trusted users only.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves a local buffer overflow in LanHelper 1.74 triggered by sending excessively long input strings via the Form Send Message feature.
Detection would involve monitoring or testing the application by attempting to send very long input strings (e.g., 6000 bytes) into the Message text field to see if the application crashes or behaves unexpectedly.
Since this is a local application vulnerability, network-based detection commands are not applicable.
No specific commands or automated detection tools are provided in the available information.