Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 17 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Interference-security
Interference-security echo Mirage |
|
| CPEs | cpe:2.3:a:interference-security:echo_mirage:3.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Interference-security
Interference-security echo Mirage |
Mon, 13 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sourceforge
Sourceforge echo Mirage |
|
| Vendors & Products |
Sourceforge
Sourceforge echo Mirage |
Sun, 12 Apr 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Echo Mirage 3.1 contains a stack buffer overflow vulnerability that allows local attackers to crash the application or execute arbitrary code by supplying an oversized string in the Rules action field. Attackers can create a malicious text file with a crafted payload exceeding buffer boundaries and paste it into the action field through the Rules dialog to trigger the overflow and overwrite the return address. | |
| Title | Echo Mirage 3.1 Stack Buffer Overflow via Rules Action Field | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-13T15:30:51.755Z
Reserved: 2026-04-05T15:39:09.009Z
Link: CVE-2019-25705
Updated: 2026-04-13T15:30:22.268Z
Status : Analyzed
Published: 2026-04-12T13:16:33.303
Modified: 2026-04-17T19:16:50.120
Link: CVE-2019-25705
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:55:52Z