← Back to CVEs
CVE-2019-25626
HIGH8.4
Description
River Past Cam Do 3.7.6 contains a local buffer overflow vulnerability in the activation code input field that allows local attackers to execute arbitrary code by supplying a malicious activation code string. Attackers can craft a buffer containing 608 bytes of junk data followed by shellcode and SEH chain overwrite values to trigger code execution when the activation dialog processes the input.
CVE Details
CVSS v3.1 Score8.4
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/24/2026
Last Modified3/24/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-434
References
http://www.flexhex.com(disclosure@vulncheck.com)
https://en.softonic.com/download/river-past-cam-do/windows/post-download?sl=1(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/46670(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/river-past-cam-do-local-buffer-overflow-in-activation-code(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.