High severity8.4NVD Advisory· Published Mar 24, 2026· Updated Apr 27, 2026
CVE-2019-25626
CVE-2019-25626
Description
River Past Cam Do 3.7.6 contains a local buffer overflow vulnerability in the activation code input field that allows local attackers to execute arbitrary code by supplying a malicious activation code string. Attackers can craft a buffer containing 608 bytes of junk data followed by shellcode and SEH chain overwrite values to trigger code execution when the activation dialog processes the input.
Affected products
1- cpe:2.3:a:river_past_cam_do_project:river_past_cam_do:*:*:*:*:*:*:*:*Range: <=3.7.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.exploit-db.com/exploits/46670nvdExploitVDB Entry
- www.vulncheck.com/advisories/river-past-cam-do-local-buffer-overflow-in-activation-codenvdThird Party Advisory
- www.flexhex.comnvdNot Applicable
- en.softonic.com/download/river-past-cam-do/windows/post-downloadnvdProduct
News mentions
0No linked articles in our index yet.