Cyber Posture

CVE-2019-25362

CriticalPublic PoC

Published: 18 February 2026

Published
18 February 2026
Modified
27 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2019-25362 is a critical-severity Out-of-bounds Write (CWE-787) vulnerability in Alloksoft Wmv To Avi Mpeg Dvd Wmv Convertor. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 27.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the insufficient bounds checking in license name and code input fields by enforcing validation of all information inputs to prevent buffer overflows.

prevent

Implements memory safeguards like stack canaries, ASLR, and DEP to protect against stack-based buffer overflow exploitation leading to arbitrary code execution.

prevent

Ensures timely remediation of the known buffer overflow flaw through patching or replacement of the vulnerable WMV Convertor software.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The stack-based buffer overflow enables arbitrary code execution via exploitation of a client application vulnerability, directly mapping to T1203: Exploitation for Client Execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

WMV to AVI MPEG DVD WMV Convertor 4.6.1217 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting the license name and license code fields. Attackers can craft a malicious payload of 6000 bytes to trigger…

more

a bind shell on port 4444 by exploiting a stack-based buffer overflow in the application's input handling.

Deeper analysisAI

CVE-2019-25362 is a stack-based buffer overflow vulnerability (CWE-787) affecting WMV to AVI MPEG DVD WMV Convertor version 4.6.1217. The issue resides in the application's input handling for the license name and license code fields, where insufficient bounds checking allows overflow conditions that enable arbitrary code execution.

An unauthenticated attacker can exploit this remotely with low complexity and no user interaction, as reflected in its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By crafting a malicious payload of 6000 bytes, the attacker can overwrite the stack to execute arbitrary code, such as triggering a bind shell on port 4444, resulting in high confidentiality, integrity, and availability impacts on the affected system.

Public proof-of-concept exploits are documented on Exploit-DB (exploits 47563 and 47568), and a vulnerability advisory is available from Vulncheck. The vendor site at Alloksoft provides the product page but does not detail patches or specific mitigations in the referenced information.

Details

CWE(s)

Affected Products

alloksoft
wmv to avi mpeg dvd wmv convertor
4.6.1217

CVEs Like This One

CVE-2019-25363Same product: Alloksoft Wmv To Avi Mpeg Dvd Wmv Convertor
CVE-2018-25211Same vendor: Alloksoft
CVE-2021-47772Shared CWE-787
CVE-2016-20038Shared CWE-787
CVE-2026-4756Shared CWE-787
CVE-2025-1744Shared CWE-787
CVE-2019-25629Shared CWE-787
CVE-2025-27363Shared CWE-787
CVE-2019-25612Shared CWE-787
CVE-2025-36897Shared CWE-787

References