CVE-2019-25554

MEDIUM

Tomabo MP4 Converter 3.25.22 Denial of Service via Name Field

Title source: cna

Description

Tomabo MP4 Converter 3.25.22 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Name field. Attackers can trigger a buffer overflow by pasting a large payload into the Name parameter when adding a preset in the Video/Audio Formats options, causing the application to crash when Reset All is clicked.

Exploits (1)

exploitdb WORKING POC
by Alejandra Sánchez · pythondoswindows
https://www.exploit-db.com/exploits/46848

Scores

CVSS v3 5.5
EPSS 0.0002
EPSS Percentile 5.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-787
Status published
Products (2)
Tomabo/MP4 Converter 3.25.22
tomabo/mp4_converter 3.25.22
Published Mar 21, 2026
Tracked Since Mar 21, 2026