CVE-2019-25569

RealTerm Serial Terminal 2.0.0.70 contains a stack-based buffer overflow vulnerability in the Echo Port field that allows local attackers to crash the application by triggering a structured exception handler (SEH) chain corruption. Attackers can craft a malicious input string with 268 bytes of padding followed by SEH overwrite values and paste it into the Port field to cause denial of service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:crun:realterm:2.0.0.70:*:*:*:*:*:*:*

History

24 Mar 2026, 20:43

Type Values Removed Values Added
CPE cpe:2.3:a:crun:realterm:2.0.0.70:*:*:*:*:*:*:*
First Time Crun realterm
Crun
Summary
  • (es) RealTerm Serial Terminal 2.0.0.70 contiene una vulnerabilidad de desbordamiento de búfer basado en pila en el campo Echo Port que permite a atacantes locales bloquear la aplicación al desencadenar una corrupción de la cadena de gestores de excepciones estructuradas (SEH). Los atacantes pueden crear una cadena de entrada maliciosa con 268 bytes de relleno seguida de valores de sobrescritura de SEH y pegarla en el campo Port para causar denegación de servicio.
References () https://realterm.sourceforge.io/ - () https://realterm.sourceforge.io/ - Product
References () https://sourceforge.net/projects/realterm/files/ - () https://sourceforge.net/projects/realterm/files/ - Product
References () https://www.exploit-db.com/exploits/46391 - () https://www.exploit-db.com/exploits/46391 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/realterm-serial-terminal-seh-overflow-crash - () https://www.vulncheck.com/advisories/realterm-serial-terminal-seh-overflow-crash - Third Party Advisory

21 Mar 2026, 13:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-21 13:16

Updated : 2026-03-24 20:43


NVD link : CVE-2019-25569

Mitre link : CVE-2019-25569

CVE.ORG link : CVE-2019-25569


JSON object : View

Products Affected

crun

  • realterm
CWE
CWE-787

Out-of-bounds Write