Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Riverpast
Riverpast river Past Camdo |
|
| Vendors & Products |
Riverpast
Riverpast river Past Camdo |
Thu, 26 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | River Past CamDo 3.7.6 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string in the Lame_enc.dll name field. Attackers can craft a payload with a 280-byte buffer, NSEH jump instruction, and SEH handler address pointing to a pop-pop-ret gadget to trigger code execution and establish a bind shell on port 3110. | |
| Title | River Past CamDo 3.7.6 Structured Exception Handler Buffer Overflow | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-26T18:52:11.464Z
Reserved: 2026-03-26T13:19:46.066Z
Link: CVE-2019-25650
Updated: 2026-03-26T18:52:08.057Z
Status : Deferred
Published: 2026-03-26T14:16:06.663
Modified: 2026-05-01T15:21:32.393
Link: CVE-2019-25650
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:26:48Z