Cyber Posture

CVE-2019-25232

CriticalPublic PoC

Published: 30 January 2026

Published
30 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 3.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2019-25232 is a critical-severity Classic Buffer Overflow (CWE-120) vulnerability in Sourceforge (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, ranked at the 3.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates and sanitizes inputs to the DNS/IP field in the Clients Control Panel to prevent buffer overflows from malicious payloads.

prevent

Implements memory protections such as ASLR and DEP to minimize successful SEH handler overwrites and arbitrary shellcode execution from buffer overflows.

prevent

Requires timely identification, reporting, and remediation of flaws like CVE-2019-25232 through patching or software replacement to eliminate the vulnerability.

NVD Description

NetPCLinker 1.0.0.0 contains a buffer overflow vulnerability in the Clients Control Panel DNS/IP field that allows attackers to execute arbitrary shellcode. Attackers can craft a malicious payload in the DNS/IP input to overwrite SEH handlers and execute shellcode when adding…

more

a new client.

Deeper analysisAI

NetPCLinker version 1.0.0.0 suffers from a buffer overflow vulnerability in the Clients Control Panel DNS/IP field, classified as CVE-2019-25232 and associated with CWE-120. This flaw enables attackers to overwrite Structured Exception Handler (SEH) handlers by crafting a malicious payload for the DNS/IP input field. When a user adds a new client using this input, the vulnerability triggers arbitrary shellcode execution. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for complete system compromise.

The vulnerability is exploitable remotely by unauthenticated attackers over the network with low complexity and no user interaction required. An attacker needs only to entice or trick a user into adding a new client entry with a specially crafted DNS/IP value, such as through social engineering or a malicious interface. Successful exploitation allows execution of arbitrary shellcode, granting high confidentiality, integrity, and availability impacts, potentially leading to full remote code execution on the affected system.

Advisories and related resources, including those from VulnCheck and an Exploit-DB entry (ID 48680), detail the vulnerability and provide proof-of-concept exploits. The NetPCLinker project page on SourceForge offers additional context on the software. No specific patches or mitigations are detailed in the available information, emphasizing the need for organizations to avoid using this version and monitor for exposure in legacy deployments.

Details

CWE(s)

Affected Products

Sourceforge
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-24956Shared CWE-120
CVE-2024-57482Shared CWE-120
CVE-2024-57479Shared CWE-120
CVE-2025-69807Shared CWE-120
CVE-2019-25353Shared CWE-120
CVE-2020-37050Shared CWE-120
CVE-2020-37207Shared CWE-120
CVE-2025-50670Shared CWE-120
CVE-2024-53027Shared CWE-120
CVE-2024-57509Shared CWE-120

References