Echo Mirage 3.1 contains a stack buffer overflow vulnerability that allows local attackers to crash the application or execute arbitrary code by supplying an oversized string in the Rules action field. Attackers can create a malicious text file with a crafted payload exceeding buffer boundaries and paste it into the action field through the Rules dialog to trigger the overflow and overwrite the return address.
References
| Link | Resource |
|---|---|
| http://initd.sh/ | Broken Link |
| https://sourceforge.net/projects/echomirage.oldbutgold.p/ | Product |
| https://www.exploit-db.com/exploits/46216 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/echo-mirage-stack-buffer-overflow-via-rules-action-field | Third Party Advisory |
Configurations
History
17 Apr 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:interference-security:echo_mirage:3.1:*:*:*:*:*:*:* | |
| First Time |
Interference-security
Interference-security echo Mirage |
|
| References | () http://initd.sh/ - Broken Link | |
| References | () https://sourceforge.net/projects/echomirage.oldbutgold.p/ - Product | |
| References | () https://www.exploit-db.com/exploits/46216 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/echo-mirage-stack-buffer-overflow-via-rules-action-field - Third Party Advisory |
12 Apr 2026, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-12 13:16
Updated : 2026-04-17 19:16
NVD link : CVE-2019-25705
Mitre link : CVE-2019-25705
CVE.ORG link : CVE-2019-25705
JSON object : View
Products Affected
interference-security
- echo_mirage
CWE
CWE-787
Out-of-bounds Write
