Description
Easy MPEG to DVD Burner 1.7.11 contains a structured exception handling (SEH) local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious username string. Attackers can craft a payload containing junk data, SEH chain pointers, and shellcode that overwrites the SEH handler to redirect execution and run arbitrary commands like opening calc.exe.
Published: 2026-04-29
Score: 8.6 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Easy MPEG to DVD Burner version 1.7.11 contains a structured exception handling (SEH) local buffer overflow that is triggered by a maliciously crafted username string. The overflow allows a local attacker to overwrite the SEH handler with a payload that redirects execution flow into injected shellcode, enabling arbitrary commands such as launching calc.exe to run with the privileges of the user running the application. The vulnerability is a classic buffer overflow (CWE‑120) and can be exploited by anyone with local access to the affected machine.

Affected Systems

The affected product is Easy MPEG to DVD Burner 1.7.11 from Ether Software, exposed via the "Easy MPEG" product line. This issue applies exclusively to the 1.7.11 build, as no other versions are listed as vulnerable in the CNA data.

Risk and Exploitability

The CVSS score of 8.6 classifies the vulnerability as high severity, and the lack of an EPSS score means no publicly available exploitation probability is reported. The vulnerability relies on local access only; an attacker must log into the system or otherwise gain local user context to craft the malicious username. Exploitation code is available on Exploit‑DB, indicating that the flaw is usable in practice. Because the flaw is not listed in CISA KEV, it has not yet been confirmed as part of known, widespread exploitation. Nevertheless, a local buffer overflow with SEH overwrite presents a significant risk and warrants prompt remediation.

Generated by OpenCVE AI on April 30, 2026 at 03:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install the latest Easy MPEG to DVD Burner release where the SEH buffer overflow is fixed; if a patch is unavailable, replace the application with a verified, up‑to‑date version.
  • Run the application only from accounts that have the least privilege necessary; do not allow it to run under system or administrative accounts.
  • Implement application whitelisting or execution control to block the injection of arbitrary shellcode into the Easy MPEG process until a vendor fix is deployed.

Generated by OpenCVE AI on April 30, 2026 at 03:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description Easy MPEG to DVD Burner 1.7.11 contains a structured exception handling (SEH) local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious username string. Attackers can craft a payload containing junk data, SEH chain pointers, and shellcode that overwrites the SEH handler to redirect execution and run arbitrary commands like opening calc.exe.
Title Easy MPEG to DVD Burner 1.7.11 SEH Local Buffer Overflow
First Time appeared Ether Software
Ether Software easy Mpeg To Dvd Burner
Weaknesses CWE-120
CPEs cpe:2.3:a:ether_software:easy_mpeg_to_dvd_burner:1.7.11:*:*:*:*:*:*:*
Vendors & Products Ether Software
Ether Software easy Mpeg To Dvd Burner
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Ether Software Easy Mpeg To Dvd Burner
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-29T19:24:34.531Z

Reserved: 2026-04-29T12:03:15.620Z

Link: CVE-2018-25301

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-29T20:16:25.320

Modified: 2026-04-29T20:16:25.320

Link: CVE-2018-25301

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T04:00:15Z

Weaknesses