CVE-2011-10025
Subtitle Processor 7.7.1 .m3u SEH Unicode Buffer Overflow
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Subtitle Processor 7.7.1 contains a buffer overflow vulnerability in its .m3u file parser. When a crafted playlist file is opened, the application converts input to Unicode and copies it to a fixed-size stack buffer without proper bounds checking. This allows an attacker to overwrite the Structured Exception Handler (SEH) and execute arbitrary code.
| CWE | CWE-120 |
| Vendor | subtitle processor |
| Product | subtitle processor |
| Published | Aug 20, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for subtitle processor subtitle processor
Be the first to know when new unknown vulnerabilities affecting subtitle processor subtitle processor are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Subtitle Processor / Subtitle Processor
* โค 7.7.1
References
fortiguard.com: https://www.fortiguard.com/encyclopedia/ips/26849 raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/subtitle_processor_m3u_bof.rb exploit-db.com: https://www.exploit-db.com/exploits/17217 exploit-db.com: https://www.exploit-db.com/exploits/17225 sourceforge.net: https://sourceforge.net/projects/subtitleproc/ vulncheck.com: https://www.vulncheck.com/advisories/subtitle-processor-m3u-seh-unicode-buffer-overflow
Credits
Brandon Murphy