Impact
PCHelpWareV2 version 1.0.0.5 contains a buffer overflow in the Group field. By entering an excessively long string in that field and clicking the OK button, a local attacker can cause the application to crash, interrupting normal use. The vulnerability does not mention code execution or data disclosure. The crash is confined to the local application process and does not propagate to other system components.
Affected Systems
The affected products are Uvnc PCHelpWareV2 1.0.0.5 and the Uvnc UltraVNC component with the same build number. No other releases are identified as vulnerable.
Risk and Exploitability
The CVSS score of 6.8 indicates moderate severity. An EPSS score below 1% suggests a low probability of widespread exploitation, and the vulnerability is not included in the CISA KEV catalog. The description requires the attacker to manually supply a long string in the Group field and trigger the crash locally, so the attack vector is local. Remote exploitation is not feasible without direct local interaction. The relevant weakness is a classic buffer overflow (CWE-787).
OpenCVE Enrichment