Impact
This vulnerability arises when a user enters an unusually long string—up to 1000 characters—in the Port field of RealTerm Serial Terminal 2.0.0.70, causing the application to crash. The issue is a lack of proper input validation, which is inferred to be a buffer overflow or similar error, classified as CWE‑1260. The crash results in a denial of service with no direct impact on data confidentiality or integrity.
Affected Systems
The affected product is RealTerm Serial Terminal version 2.0.0.70 from the Realterm vendor. No other referenced versions or products are identified as vulnerable in the supplied data.
Risk and Exploitability
The CVSS score of 6.8 indicates moderate severity, and the EPSS score of under 1 % shows a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires local access: the attacker must run the program and supply the malformed input. Thus the risk is moderate, the attack vector is local, and it does not provide broader system compromise.
OpenCVE Enrichment