CVE-2019-25705

Echo Mirage 3.1 contains a stack buffer overflow vulnerability that allows local attackers to crash the application or execute arbitrary code by supplying an oversized string in the Rules action field. Attackers can create a malicious text file with a crafted payload exceeding buffer boundaries and paste it into the action field through the Rules dialog to trigger the overflow and overwrite the return address.
Configurations

Configuration 1 (hide)

cpe:2.3:a:interference-security:echo_mirage:3.1:*:*:*:*:*:*:*

History

17 Apr 2026, 19:16

Type Values Removed Values Added
CPE cpe:2.3:a:interference-security:echo_mirage:3.1:*:*:*:*:*:*:*
First Time Interference-security
Interference-security echo Mirage
References () http://initd.sh/ - () http://initd.sh/ - Broken Link
References () https://sourceforge.net/projects/echomirage.oldbutgold.p/ - () https://sourceforge.net/projects/echomirage.oldbutgold.p/ - Product
References () https://www.exploit-db.com/exploits/46216 - () https://www.exploit-db.com/exploits/46216 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/echo-mirage-stack-buffer-overflow-via-rules-action-field - () https://www.vulncheck.com/advisories/echo-mirage-stack-buffer-overflow-via-rules-action-field - Third Party Advisory

12 Apr 2026, 13:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-12 13:16

Updated : 2026-04-17 19:16


NVD link : CVE-2019-25705

Mitre link : CVE-2019-25705

CVE.ORG link : CVE-2019-25705


JSON object : View

Products Affected

interference-security

  • echo_mirage
CWE
CWE-787

Out-of-bounds Write