CVE-2019-25570

Published: Mar 21, 2026 Last Modified: Mar 21, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,8
Attack Vector: local
Attack Complexity: low
Privileges Required: none
User Interaction: passive
Confidentiality: N/A
Integrity: N/A
Availability: N/A
MEDIUM 5,5
Attack Vector: local
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high

Description

AI Translation Available

RealTerm Serial Terminal 2.0.0.70 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Port field. Attackers can paste a buffer of 1000 characters into the Port input field and click the open button to trigger a crash.

1260

Improper Handling of Overlap Between Protected Memory Ranges

Stable
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Availability
Potential Impacts:
Modify Memory Read Memory Dos: Instability
Applicable Platforms
Technologies: Memory Hardware, Processor Hardware
View CWE Details
https://realterm.sourceforge.io/
https://sourceforge.net/projects/realterm/files/
https://www.exploit-db.com/exploits/46390
https://www.vulncheck.com/advisories/realterm-serial-terminal-denial-of-service…