CVE-2018-25261

Iperius Backup 5.8.1 contains a local buffer overflow vulnerability in the structured exception handling (SEH) mechanism that allows local attackers to execute arbitrary code by supplying a malicious file path. Attackers can create a backup job with a crafted payload in the external file location field that triggers a buffer overflow when the backup job executes, enabling code execution with application privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:entersrl:iperius_backup:5.8.1:*:*:*:*:*:*:*

History

29 Apr 2026, 23:29

Type Values Removed Values Added
CPE cpe:2.3:a:entersrl:iperius_backup:5.8.1:*:*:*:*:*:*:*
First Time Entersrl iperius Backup
Entersrl
References () https://www.exploit-db.com/exploits/46059 - () https://www.exploit-db.com/exploits/46059 - Exploit, VDB Entry
References () https://www.iperiusbackup.com - () https://www.iperiusbackup.com - Product
References () https://www.vulncheck.com/advisories/iperius-backup-local-buffer-overflow-seh - () https://www.vulncheck.com/advisories/iperius-backup-local-buffer-overflow-seh - Third Party Advisory

22 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-22 16:16

Updated : 2026-04-29 23:29


NVD link : CVE-2018-25261

Mitre link : CVE-2018-25261

CVE.ORG link : CVE-2018-25261


JSON object : View

Products Affected

entersrl

  • iperius_backup
CWE
CWE-787

Out-of-bounds Write