CVE-2019-25362
Published: 18 February 2026
Description
WMV to AVI MPEG DVD WMV Convertor 4.6.1217 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting the license name and license code fields. Attackers can craft a malicious payload of 6000 bytes to trigger…
more
a bind shell on port 4444 by exploiting a stack-based buffer overflow in the application's input handling.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the insufficient bounds checking in license name and code input fields by enforcing validation of all information inputs to prevent buffer overflows.
Implements memory safeguards like stack canaries, ASLR, and DEP to protect against stack-based buffer overflow exploitation leading to arbitrary code execution.
Ensures timely remediation of the known buffer overflow flaw through patching or replacement of the vulnerable WMV Convertor software.
Security SummaryAI
CVE-2019-25362 is a stack-based buffer overflow vulnerability (CWE-787) affecting WMV to AVI MPEG DVD WMV Convertor version 4.6.1217. The issue resides in the application's input handling for the license name and license code fields, where insufficient bounds checking allows overflow conditions that enable arbitrary code execution.
An unauthenticated attacker can exploit this remotely with low complexity and no user interaction, as reflected in its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By crafting a malicious payload of 6000 bytes, the attacker can overwrite the stack to execute arbitrary code, such as triggering a bind shell on port 4444, resulting in high confidentiality, integrity, and availability impacts on the affected system.
Public proof-of-concept exploits are documented on Exploit-DB (exploits 47563 and 47568), and a vulnerability advisory is available from Vulncheck. The vendor site at Alloksoft provides the product page but does not detail patches or specific mitigations in the referenced information.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The stack-based buffer overflow enables arbitrary code execution via exploitation of a client application vulnerability, directly mapping to T1203: Exploitation for Client Execution.