Terminal Services Manager 3.1 contains a stack-based buffer overflow vulnerability in the computer names field that allows local attackers to execute arbitrary code by triggering structured exception handling. Attackers can craft a malicious input file with shellcode and jump instructions that overwrite the SEH handler pointer to execute calc.exe or other payloads when imported through the add computers wizard.
References
| Link | Resource |
|---|---|
| https://lizardsystems.com | Product |
| https://www.exploit-db.com/exploits/46058 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/terminal-services-manager-buffer-overflow-seh | Third Party Advisory |
Configurations
History
29 Apr 2026, 23:33
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:lizardsystems:terminal_services_manager:*:*:*:*:*:*:*:* | |
| First Time |
Lizardsystems terminal Services Manager
Lizardsystems |
|
| References | () https://lizardsystems.com - Product | |
| References | () https://www.exploit-db.com/exploits/46058 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/terminal-services-manager-buffer-overflow-seh - Third Party Advisory |
22 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-22 16:16
Updated : 2026-04-29 23:33
NVD link : CVE-2018-25259
Mitre link : CVE-2018-25259
CVE.ORG link : CVE-2018-25259
JSON object : View
Products Affected
lizardsystems
- terminal_services_manager
CWE
CWE-306
Missing Authentication for Critical Function
