TuneClone 2.20 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious license code string. Attackers can craft a payload with a controlled buffer, NSEH jump instruction, and SEH handler address pointing to a ROP gadget, then paste it into the license code field to trigger code execution and establish a bind shell.
References
Configurations
No configuration.
History
22 Mar 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-22 14:16
Updated : 2026-03-23 14:31
NVD link : CVE-2019-25603
Mitre link : CVE-2019-25603
CVE.ORG link : CVE-2019-25603
JSON object : View
Products Affected
No product.
CWE
CWE-787
Out-of-bounds Write
