Cyber Posture

CVE-2019-25434

HighPublic PoC

Published: 20 February 2026

Published
20 February 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0015 35.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2019-25434 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Nsasoft Spotauditor. Its CVSS base score is 7.5 (High).

Operationally, ranked at the 35.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

NVD Description

SpotAuditor 5.3.1.0 contains a denial of service vulnerability that allows unauthenticated attackers to crash the application by submitting excessive data in the registration name field. Attackers can enter a large string of characters (5000 bytes or more) in the name…

more

field during registration to trigger an unhandled exception that crashes the application.

Deeper analysisAI

CVE-2019-25434 is a denial of service vulnerability affecting SpotAuditor version 5.3.1.0. The flaw stems from the application's inadequate handling of excessive input in the registration name field, where submitting a large string of characters—5000 bytes or more—triggers an unhandled exception that crashes the application. This issue aligns with CWE-121 (stack-based buffer overflow) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), highlighting its high impact on availability.

Unauthenticated attackers with network access can exploit this vulnerability remotely and with low complexity, requiring no privileges or user interaction. By entering oversized data into the registration name field, they can reliably cause the SpotAuditor application to crash, resulting in a denial of service condition that disrupts functionality for legitimate users.

Advisories and references, including the vendor site at http://www.nsauditor.com, an Exploit-DB proof-of-concept at https://www.exploit-db.com/exploits/47494, and a VulnCheck advisory at https://www.vulncheck.com/advisories/spotauditor-denial-of-service-via-registration-name-field, document the vulnerability but do not specify patches or detailed mitigation steps in the provided information. Security practitioners should verify updates from the vendor and consider input validation or restricting registration access as interim measures.

Details

CWE(s)

Affected Products

nsasoft
spotauditor
≤ 5.3.1.0

CVEs Like This One

CVE-2019-25340Same product: Nsasoft Spotauditor
CVE-2019-25336Same product: Nsasoft Spotauditor
CVE-2020-37200Same vendor: Nsasoft
CVE-2020-37119Same vendor: Nsasoft
CVE-2020-37207Same vendor: Nsasoft
CVE-2020-37130Same vendor: Nsasoft
CVE-2020-37212Same vendor: Nsasoft
CVE-2018-25213Same vendor: Nsasoft
CVE-2021-47814Same vendor: Nsasoft
CVE-2021-47895Same vendor: Nsasoft

References