CVE-2019-25554
MEDIUMTomabo MP4 Converter 3.25.22 Denial of Service via Name Field
Title source: cnaDescription
Tomabo MP4 Converter 3.25.22 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Name field. Attackers can trigger a buffer overflow by pasting a large payload into the Name parameter when adding a preset in the Video/Audio Formats options, causing the application to crash when Reset All is clicked.
Exploits (1)
exploitdb
WORKING POC
by Alejandra Sánchez · pythondoswindows
https://www.exploit-db.com/exploits/46848
Scores
CVSS v3
5.5
EPSS
0.0002
EPSS Percentile
5.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-787
Status
published
Products (2)
Tomabo/MP4 Converter
3.25.22
tomabo/mp4_converter
3.25.22
Published
Mar 21, 2026
Tracked Since
Mar 21, 2026