CVE-2019-25603

HIGH

TuneClone 2.20 Structured Exception Handler Buffer Overflow

Title source: cna

Description

TuneClone 2.20 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious license code string. Attackers can craft a payload with a controlled buffer, NSEH jump instruction, and SEH handler address pointing to a ROP gadget, then paste it into the license code field to trigger code execution and establish a bind shell.

Exploits (1)

exploitdb WORKING POC
by Achilles · pythonlocalwindows
https://www.exploit-db.com/exploits/47012

Scores

CVSS v3 8.4
EPSS 0.0001
EPSS Percentile 0.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-787
Status published
Products (1)
TuneClone/TuneClone 2.20
Published Mar 22, 2026
Tracked Since Mar 22, 2026