Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 25 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tuneclone
Tuneclone tuneclone |
|
| Vendors & Products |
Tuneclone
Tuneclone tuneclone |
Sun, 22 Mar 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TuneClone 2.20 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious license code string. Attackers can craft a payload with a controlled buffer, NSEH jump instruction, and SEH handler address pointing to a ROP gadget, then paste it into the license code field to trigger code execution and establish a bind shell. | |
| Title | TuneClone 2.20 Structured Exception Handler Buffer Overflow | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-25T13:40:10.077Z
Reserved: 2026-03-22T13:05:10.167Z
Link: CVE-2019-25603
Updated: 2026-03-25T13:40:04.906Z
Status : Deferred
Published: 2026-03-22T14:16:27.893
Modified: 2026-04-16T16:19:50.757
Link: CVE-2019-25603
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:46:13Z