Cyber Posture

CVE-2019-25612

HighPublic PoC

Published: 22 March 2026

Published
22 March 2026
Modified
16 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0002 3.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2019-25612 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Softonic (inferred from references). Its CVSS base score is 7.8 (High).

Operationally, ranked at the 3.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of user inputs to the Folder Path field to prevent oversized or malformed payloads from triggering the SEH buffer overflow.

prevent

Implements memory protections like DEP and ASLR to block arbitrary code execution even if the buffer overflow in the System Compare feature is triggered.

prevent

Mandates timely patching and remediation of the known SEH buffer overflow vulnerability in Admin Express version 1.2.5.485.

NVD Description

Admin Express 1.2.5.485 contains a local structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an alphanumeric encoded payload in the Folder Path field. Attackers can trigger the vulnerability through the System Compare…

more

feature by pasting a crafted buffer overflow payload into the left-hand side Folder Path field and clicking the scale icon to execute shellcode with application privileges.

Deeper analysisAI

CVE-2019-25612 is a local structured exception handling (SEH) buffer overflow vulnerability in Admin Express version 1.2.5.485. The flaw resides in the System Compare feature, where the left-hand side Folder Path field fails to properly handle oversized inputs, enabling attackers to supply an alphanumeric encoded payload that triggers the overflow.

Local attackers who can run the application on the target system can exploit this vulnerability by pasting a crafted buffer overflow payload into the Folder Path field and clicking the scale icon. This action executes arbitrary shellcode with the privileges of the Admin Express application, granting high-impact confidentiality, integrity, and availability compromises as indicated by its CVSS 3.1 score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H). No special privileges are required beyond local access, though user interaction is needed to trigger the exploit.

References include a proof-of-concept exploit on Exploit-DB (ID 46805) and a Vulncheck advisory detailing the local SEH buffer overflow via the Folder Path field. Softonic pages provide download links for Admin Express, but no vendor patches or specific mitigation steps are outlined in the available information. The issue maps to CWE-787 (Out-of-bounds Write).

Details

CWE(s)

Affected Products

Softonic
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-20890Shared CWE-787
CVE-2019-25681Shared CWE-787
CVE-2026-23715Shared CWE-787
CVE-2025-21161Shared CWE-787
CVE-2026-21327Shared CWE-787
CVE-2025-21042Shared CWE-787
CVE-2026-3094Shared CWE-787
CVE-2026-27703Shared CWE-787
CVE-2026-31698Shared CWE-787
CVE-2025-20888Shared CWE-787

References