CVE-2019-25679

RealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH) buffer overflow vulnerability in the Echo Port tab that allows local attackers to execute arbitrary code by supplying a malicious payload. Attackers can craft a buffer overflow payload with a POP POP RET gadget chain and shellcode that triggers code execution when pasted into the Port field and the Change button is clicked.
Configurations

Configuration 1 (hide)

cpe:2.3:a:crun:realterm:2.0.0.70:*:*:*:*:*:*:*

History

20 Apr 2026, 17:48

Type Values Removed Values Added
First Time Crun realterm
Crun
CPE cpe:2.3:a:crun:realterm:2.0.0.70:*:*:*:*:*:*:*
References () https://realterm.sourceforge.io/ - () https://realterm.sourceforge.io/ - Product
References () https://sourceforge.net/projects/realterm/files/ - () https://sourceforge.net/projects/realterm/files/ - Product
References () https://www.exploit-db.com/exploits/46441 - () https://www.exploit-db.com/exploits/46441 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/realterm-serial-terminal-buffer-overflow-seh - () https://www.vulncheck.com/advisories/realterm-serial-terminal-buffer-overflow-seh - Third Party Advisory

05 Apr 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-05 21:16

Updated : 2026-04-20 17:48


NVD link : CVE-2019-25679

Mitre link : CVE-2019-25679

CVE.ORG link : CVE-2019-25679


JSON object : View

Products Affected

crun

  • realterm
CWE
CWE-787

Out-of-bounds Write