Impact
RAR Password Recovery 1.80 contains a buffer overflow that allows a local attacker to crash the application by supplying an oversized payload in the registration dialog. The attacker can craft an input string exceeding 6000 bytes and paste it into the User Name and Registration Code field, triggering a denial‑of‑service condition for legitimate users. This weakness is identified as CWE‑787.
Affected Systems
The affected product is Top‑Password RAR Password Recovery version 1.80. No other versions or products are listed, and the vulnerability is limited to local users who can supply registration data.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity, while the EPSS score of less than 1% suggests that exploitation is currently unlikely. The vulnerability is not included in the CISA KEV catalog. Attackers must have local access and manually submit a malicious registration string; thus, exploitation would require user interaction and is not readily automated.
OpenCVE Enrichment