RealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH) buffer overflow vulnerability in the Echo Port tab that allows local attackers to execute arbitrary code by supplying a malicious payload. Attackers can craft a buffer overflow payload with a POP POP RET gadget chain and shellcode that triggers code execution when pasted into the Port field and the Change button is clicked.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Realterm
Realterm realterm: Serial Terminal |
|
| Vendors & Products |
Realterm
Realterm realterm: Serial Terminal |
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 05 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH) buffer overflow vulnerability in the Echo Port tab that allows local attackers to execute arbitrary code by supplying a malicious payload. Attackers can craft a buffer overflow payload with a POP POP RET gadget chain and shellcode that triggers code execution when pasted into the Port field and the Change button is clicked. | |
| Title | RealTerm Serial Terminal 2.0.0.70 Buffer Overflow SEH | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-04-05T20:45:29.972Z
Updated: 2026-04-06T18:02:53.380Z
Reserved: 2026-04-05T13:31:07.337Z
Link: CVE-2019-25679
Updated: 2026-04-06T17:59:01.192Z
Status : Awaiting Analysis
Published: 2026-04-05T21:16:46.127
Modified: 2026-04-07T13:20:35.010
Link: CVE-2019-25679
No data.