Impact
Allok Video Splitter version 3.1.1217 suffers from a stack-based buffer overflow triggered when a user supplies an oversized string in the License Name field and presses the Register button. The overflow occurs when the input exceeds 780 bytes, potentially allowing a local attacker to crash the application or execute arbitrary code through crafted input. This weakness corresponds to CWE‑787.
Affected Systems
This vulnerability impacts Alloksoft’s Video Splitter product at version 3.1.1217, as identified by the CPE entry. The flaw resides in the registration form of this application and is specific to the specified version. No other products are listed as affected in the available CNA data.
Risk and Exploitability
The CVSS score of 8.5 indicates a high severity level, while the EPSS score of less than 1% suggests limited current exploitation activity. It is not present in the CISA KEV catalog. The attack vector is local; a user must have local access to the machine running the application in order to provide the malicious License Name payload. While no public exploit code is cited in the references, the potential for arbitrary code execution warrants immediate attention.
OpenCVE Enrichment