RealTerm Serial Terminal 2.0.0.70 contains a stack-based buffer overflow vulnerability in the Echo Port field that allows local attackers to crash the application by triggering a structured exception handler (SEH) chain corruption. Attackers can craft a malicious input string with 268 bytes of padding followed by SEH overwrite values and paste it into the Port field to cause denial of service.

Project Subscriptions

Vendors Products
Realterm Subscribe
Realterm: Serial Terminal Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 24 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Crun
Crun realterm
CPEs cpe:2.3:a:crun:realterm:2.0.0.70:*:*:*:*:*:*:*
Vendors & Products Crun
Crun realterm

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Realterm
Realterm realterm: Serial Terminal
Vendors & Products Realterm
Realterm realterm: Serial Terminal

Sat, 21 Mar 2026 13:00:00 +0000

Type Values Removed Values Added
Description RealTerm Serial Terminal 2.0.0.70 contains a stack-based buffer overflow vulnerability in the Echo Port field that allows local attackers to crash the application by triggering a structured exception handler (SEH) chain corruption. Attackers can craft a malicious input string with 268 bytes of padding followed by SEH overwrite values and paste it into the Port field to cause denial of service.
Title RealTerm Serial Terminal 2.0.0.70 SEH Overflow Crash
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-23T20:09:18.372Z

Reserved: 2026-03-21T12:36:51.381Z

Link: CVE-2019-25569

cve-icon Vulnrichment

Updated: 2026-03-23T20:08:55.739Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-21T13:16:20.653

Modified: 2026-03-24T20:43:05.600

Link: CVE-2019-25569

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:47:14Z

Weaknesses