CVE-2019-25609
JetAudio jetCast Server 2.0 Local SEH Buffer Overflow
CVSS Score
8.4
EPSS Score
0.0%
EPSS Percentile
2th
JetAudio jetCast Server 2.0 contains a stack-based buffer overflow vulnerability in the Log Directory configuration field that allows local attackers to overwrite structured exception handling pointers. Attackers can inject alphanumeric encoded shellcode through the Log Directory field to trigger an SEH exception handler and execute arbitrary code with application privileges.
| CWE | CWE-787 |
| Vendor | jetaudio |
| Product | server |
| Published | Mar 22, 2026 |
| Last Updated | Mar 25, 2026 |
Stay Ahead of the Next One
Get instant alerts for jetaudio server
Be the first to know when new high vulnerabilities affecting jetaudio server are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Jetaudio / Server
2.0
References
exploit-db.com: https://www.exploit-db.com/exploits/46854 jetaudio.com: http://www.jetaudio.com/ jetaudio.com: http://www.jetaudio.com/download/5fc01426-741d-41b8-a120-d890330ec672/jetAudio/Download/jetCast/build/JCS2000.exe vulncheck.com: https://www.vulncheck.com/advisories/jetaudio-jetcast-server-local-seh-buffer-overflow
Credits
Connor McGarr (https://connormcgarr.github.io)