Ad

CVE-2019-25554

MEDIUM CVSS 4.0: 6.8 EPSS 0.02%
Updated Apr 16, 2026
Payload
Parameter Value
CVSS 6.8 (MEDIUM)
Type CWE-787 (Out-of-bounds Write)
Vendor Payload
Public PoC Yes

Tomabo MP4 Converter 3.25.22 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Name field. Attackers can trigger a buffer overflow by pasting a large payload into the Name parameter when adding a preset in the Video/Audio Formats options, causing the application to crash when Reset All is clicked.

Attack Parameters

Attack Vector
Local
Requires local access
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
Passive
Minimal interaction

Impact Assessment

Confidentiality
None
No data leak
Integrity
None
No data modification
Availability
High
Complete denial of service

CVSS Vector v4.0

Weakness Type (CWE)

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Tomabo Mp4_Converter
cpe:2.3:a:tomabo:mp4_converter:3.25.22:*:*:*:*:*:*:*