CVE-2019-25679
Received Received - Intake
SEH Buffer Overflow in RealTerm 2.0.0.70 Enables Code Execution

Publication date: 2026-04-05

Last updated on: 2026-04-20

Assigner: VulnCheck

Description
RealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH) buffer overflow vulnerability in the Echo Port tab that allows local attackers to execute arbitrary code by supplying a malicious payload. Attackers can craft a buffer overflow payload with a POP POP RET gadget chain and shellcode that triggers code execution when pasted into the Port field and the Change button is clicked.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-05
Last Modified
2026-04-20
Generated
2026-05-07
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
crun realterm 2.0.0.70
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in RealTerm Serial Terminal version 2.0.0.70 and is a structured exception handling (SEH) buffer overflow in the Echo Port tab.

Local attackers can exploit this by supplying a specially crafted malicious payload into the Port field and then clicking the Change button.

The crafted payload uses a POP POP RET gadget chain and shellcode to trigger arbitrary code execution on the affected system.


How can this vulnerability impact me? :

This vulnerability allows local attackers to execute arbitrary code on the affected system.

Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the system, as indicated by the high CVSS scores.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart