CVE-2019-25689
Local Buffer Overflow in HTML5 Video Player 1.2.5 Enables Code Execution
Publication date: 2026-04-12
Last updated on: 2026-04-17
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| socusoft | html5_video_player | 1.2.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2019-25689 is a local buffer overflow vulnerability found in HTML5 Video Player version 1.2.5 and earlier. It occurs when an attacker supplies an oversized key code string exceeding 997 bytes into the KEY CODE field in the Help Register dialog. This overflow allows the attacker to overwrite memory and execute arbitrary code on the affected system.
The exploit involves crafting a malicious payload that triggers the buffer overflow, enabling the attacker to control the instruction pointer and run code of their choice. A demonstration of this exploit shows spawning a calculator process, proving arbitrary code execution is possible.
How can this vulnerability impact me? :
This vulnerability can have severe impacts as it allows an attacker to execute arbitrary code locally on your system without any user interaction or privileges. Exploiting this flaw could lead to full compromise of the affected machine.
- Execution of malicious code leading to unauthorized actions.
- Potential installation of malware or backdoors.
- Loss of confidentiality, integrity, and availability of data and system resources.
- Attackers can gain control over the system, as demonstrated by spawning a calculator process.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if the HTML5 Video Player version 1.2.5 or earlier is installed on the system, as the flaw exists in these versions.
Since the exploit is triggered by pasting an oversized key code string (exceeding 997 bytes) into the KEY CODE field in the Help Register dialog, monitoring or detecting unusually large inputs in this field could indicate an attempt to exploit the vulnerability.
There are no specific network commands to detect this vulnerability because it is a local buffer overflow triggered by local input.
Suggested detection steps include:
- Verify the installed version of HTML5 Video Player by checking the application properties or using system package queries.
- Monitor application logs or user input fields for unusually large strings in the KEY CODE field.
- Use system monitoring tools to detect unexpected process creation, such as calculator.exe spawning unexpectedly.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include:
- Avoid using or disable the Help Register dialog where the KEY CODE field accepts input, to prevent triggering the buffer overflow.
- Do not paste or accept any key code strings exceeding 997 bytes in length.
- If possible, upgrade to a version of HTML5 Video Player that has patched this vulnerability or apply any available security patches.
- Restrict local user permissions to prevent unauthorized users from running or interacting with the vulnerable application.
- Monitor for suspicious activity such as unexpected process execution (e.g., calculator.exe) that may indicate exploitation attempts.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not include any details on how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.