CVE-2019-25660
Received Received - Intake
Buffer Overflow in LanHelper 1.74 Causes Application Crash

Publication date: 2026-04-05

Last updated on: 2026-04-20

Assigner: VulnCheck

Description
LanHelper 1.74 contains a local buffer overflow vulnerability that allows attackers to crash the application by sending excessively long input strings. Attackers can exploit the Form Send Message feature by pasting 6000 bytes of data into the Message text field to trigger a denial of service condition.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-05
Last Modified
2026-04-20
Generated
2026-05-06
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
hainsoft lanhelper to 1.74 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

LanHelper version 1.74 has a local buffer overflow vulnerability. This means that the application does not properly handle very long input strings, specifically in the Form Send Message feature. An attacker can exploit this by pasting 6000 bytes of data into the Message text field, which causes the application to crash.


How can this vulnerability impact me? :

This vulnerability can be used by an attacker to cause a denial of service (DoS) condition by crashing the LanHelper application. This means the application will stop functioning properly, potentially disrupting normal operations.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding the use of the Form Send Message feature with excessively long input strings to prevent triggering the buffer overflow.

Restrict user input length in the Message text field to less than 6000 bytes.

Apply any available patches or updates from the vendor once released.

Monitor the application for crashes or denial of service conditions and restrict access to trusted users only.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves a local buffer overflow in LanHelper 1.74 triggered by sending excessively long input strings via the Form Send Message feature.

Detection would involve monitoring or testing the application by attempting to send very long input strings (e.g., 6000 bytes) into the Message text field to see if the application crashes or behaves unexpectedly.

Since this is a local application vulnerability, network-based detection commands are not applicable.

No specific commands or automated detection tools are provided in the available information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart