CVE-2019-25670
Structured Exception Handler Buffer Overflow in River Past Video Cleaner
Publication date: 2026-04-05
Last updated on: 2026-04-27
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| river_past_video_cleaner_project | river_past_video_cleaner | to 7.6.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
River Past Video Cleaner 7.6.3 contains a structured exception handler buffer overflow vulnerability. This vulnerability allows local attackers to execute arbitrary code by providing a specially crafted malicious string in the Lame_enc.dll field. The attacker crafts a payload consisting of 280 bytes of padding, a next structured exception handler override, and shellcode, which triggers code execution when the application processes this input.
How can this vulnerability impact me? :
This vulnerability can allow a local attacker to execute arbitrary code on the affected system. Successful exploitation could lead to full compromise of the system, including unauthorized access, data modification, or disruption of services.