Cyber Posture

CVE-2019-25628

CriticalPublic PoC

Published: 24 March 2026

Published
24 March 2026
Modified
24 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0024 47.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Download Accelerator Plus DAP 10.0.6.0 contains a structured exception handler buffer overflow vulnerability that allows remote attackers to execute arbitrary code by crafting malicious URLs. Attackers can create specially crafted URLs with overflowing buffer data that overwrites SEH pointers and…

more

executes embedded shellcode when imported through the application's web page import functionality.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires organizations to identify, report, and correct flaws like the SEH buffer overflow in DAP 10.0.6.0 through timely patching or upgrades.

prevent

Mandates validation of untrusted inputs such as malicious URLs processed by the web page import functionality to prevent buffer overflows.

prevent

Implements memory protections like ASLR and DEP that disrupt SEH pointer overwrites and shellcode execution in buffer overflow exploits.

Security SummaryAI

Download Accelerator Plus (DAP) version 10.0.6.0 is affected by CVE-2019-25628, a structured exception handler (SEH) buffer overflow vulnerability classified under CWE-787 (Out-of-bounds Write). The flaw occurs when the application processes specially crafted URLs through its web page import functionality, allowing overflowing buffer data to overwrite SEH pointers and trigger execution of embedded shellcode. This remote code execution vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with no user interaction or privileges required.

Remote attackers can exploit this vulnerability by creating malicious URLs containing buffer overflow payloads, which victims import via DAP's web page import feature. Successful exploitation leads to arbitrary code execution on the target's system with the privileges of the DAP process, potentially enabling full system compromise, data theft, or malware deployment. The attack requires no authentication and has low complexity, making it highly practical against unpatched installations.

Advisories and references, including those from Vulncheck and Exploit-DB (exploit 46673), document the vulnerability and provide proof-of-concept details, confirming remote code execution via SEH overwrite. Vendor pages from Speedbit (DAP developer) are referenced but do not specify patches or mitigations in the available information. Security practitioners should advise users to discontinue use of DAP 10.0.6.0 or seek updates, while monitoring for exploitation attempts targeting this outdated download manager.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The SEH buffer overflow in DAP's web page import functionality enables remote code execution via crafted URLs, directly mapping to Exploitation for Client Execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References