CVE-2019-25679
SEH Buffer Overflow in RealTerm 2.0.0.70 Enables Code Execution
Publication date: 2026-04-05
Last updated on: 2026-04-20
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| crun | realterm | 2.0.0.70 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in RealTerm Serial Terminal version 2.0.0.70 and is a structured exception handling (SEH) buffer overflow in the Echo Port tab.
Local attackers can exploit this by supplying a specially crafted malicious payload into the Port field and then clicking the Change button.
The crafted payload uses a POP POP RET gadget chain and shellcode to trigger arbitrary code execution on the affected system.
How can this vulnerability impact me? :
This vulnerability allows local attackers to execute arbitrary code on the affected system.
Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the system, as indicated by the high CVSS scores.