Cyber Posture

CVE-2019-25362

CriticalPublic PoC

Published: 18 February 2026

Published
18 February 2026
Modified
27 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

WMV to AVI MPEG DVD WMV Convertor 4.6.1217 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting the license name and license code fields. Attackers can craft a malicious payload of 6000 bytes to trigger…

more

a bind shell on port 4444 by exploiting a stack-based buffer overflow in the application's input handling.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the insufficient bounds checking in license name and code input fields by enforcing validation of all information inputs to prevent buffer overflows.

prevent

Implements memory safeguards like stack canaries, ASLR, and DEP to protect against stack-based buffer overflow exploitation leading to arbitrary code execution.

prevent

Ensures timely remediation of the known buffer overflow flaw through patching or replacement of the vulnerable WMV Convertor software.

Security SummaryAI

CVE-2019-25362 is a stack-based buffer overflow vulnerability (CWE-787) affecting WMV to AVI MPEG DVD WMV Convertor version 4.6.1217. The issue resides in the application's input handling for the license name and license code fields, where insufficient bounds checking allows overflow conditions that enable arbitrary code execution.

An unauthenticated attacker can exploit this remotely with low complexity and no user interaction, as reflected in its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By crafting a malicious payload of 6000 bytes, the attacker can overwrite the stack to execute arbitrary code, such as triggering a bind shell on port 4444, resulting in high confidentiality, integrity, and availability impacts on the affected system.

Public proof-of-concept exploits are documented on Exploit-DB (exploits 47563 and 47568), and a vulnerability advisory is available from Vulncheck. The vendor site at Alloksoft provides the product page but does not detail patches or specific mitigations in the referenced information.

Details

CWE(s)

Affected Products

alloksoft
wmv to avi mpeg dvd wmv convertor
4.6.1217

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The stack-based buffer overflow enables arbitrary code execution via exploitation of a client application vulnerability, directly mapping to T1203: Exploitation for Client Execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References