Medium severity5.5NVD Advisory· Published Mar 21, 2026· Updated Apr 16, 2026
CVE-2019-25554
CVE-2019-25554
Description
Tomabo MP4 Converter 3.25.22 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Name field. Attackers can trigger a buffer overflow by pasting a large payload into the Name parameter when adding a preset in the Video/Audio Formats options, causing the application to crash when Reset All is clicked.
Affected products
1- cpe:2.3:a:tomabo:mp4_converter:3.25.22:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.exploit-db.com/exploits/46848nvdExploitVDB Entry
- www.vulncheck.com/advisories/tomabo-mp4-converter-denial-of-service-via-name-fieldnvdThird Party Advisory
- www.tomabo.comnvdProduct
News mentions
0No linked articles in our index yet.