CVE-2019-25679
RealTerm Serial Terminal 2.0.0.70 Buffer Overflow SEH
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
2th
RealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH) buffer overflow vulnerability in the Echo Port tab that allows local attackers to execute arbitrary code by supplying a malicious payload. Attackers can craft a buffer overflow payload with a POP POP RET gadget chain and shellcode that triggers code execution when pasted into the Port field and the Change button is clicked.
| CWE | CWE-787 |
| Vendor | realterm |
| Product | realterm: serial terminal |
| Published | Apr 5, 2026 |
| Last Updated | Apr 6, 2026 |
Stay Ahead of the Next One
Get instant alerts for realterm realterm: serial terminal
Be the first to know when new high vulnerabilities affecting realterm realterm: serial terminal are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Realterm / RealTerm: Serial Terminal
1.11.2
References
Credits
Matteo Malvica