CVE-2019-25569
RealTerm Serial Terminal 2.0.0.70 SEH Overflow Crash
CVSS Score
6.2
EPSS Score
0.0%
EPSS Percentile
0th
RealTerm Serial Terminal 2.0.0.70 contains a stack-based buffer overflow vulnerability in the Echo Port field that allows local attackers to crash the application by triggering a structured exception handler (SEH) chain corruption. Attackers can craft a malicious input string with 268 bytes of padding followed by SEH overwrite values and paste it into the Port field to cause denial of service.
| CWE | CWE-787 |
| Vendor | realterm |
| Product | realterm: serial terminal |
| Published | Mar 21, 2026 |
| Last Updated | Mar 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for realterm realterm: serial terminal
Be the first to know when new medium vulnerabilities affecting realterm realterm: serial terminal are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Affected Versions
Realterm / RealTerm: Serial Terminal
2.0.0.70
References
Credits
Alejandra Sánchez