Description
Lavavo CD Ripper 4.20 contains a structured exception handling (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string in the License Activation Name field. Attackers can craft a payload with controlled buffer data, NSEH jump instructions, and SEH handler addresses to trigger code execution and establish a bind shell on port 3110.
Published: 2026-03-22
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Code Execution via SEH Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

Lavavo CD Ripper 4.20 has a structured exception handling buffer overflow that can be triggered by supplying a crafted string in the License Activation Name field. When the application processes this input, a malicious payload can overwrite the SEH chain, redirect execution flow, and spawn a bind shell on port 3110. This results in local code execution, allowing an attacker to run arbitrary code with the privileges of the logged‑in user. The flaw is a classic heap-based buffer overflow (CWE‑787).

Affected Systems

The vulnerability affects Lavavo CD Ripper version 4.20 from Lavavosoftware. No other product versions are listed, so installations of 4.20 are considered vulnerable. The application is a Windows-based CD copying utility typically used in desktop environments.

Risk and Exploitability

The CVSS score of 8.6 categorizes it as high severity. The exploit requires local access to the affected machine; the EPSS score is not available, so the likelihood of exploitation is uncertain, but the lack of a CISA KEV listing suggests no widespread exploitation yet. Attackers could introduce the malicious input via a forged license name field or a special license file, making the vulnerability exploitable in environments where users can manipulate that input. No public exploitation report beyond the available proof‑of‑concept exists.

Generated by OpenCVE AI on March 22, 2026 at 14:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Lavavo CD Ripper to the latest release available from the vendor; current version 4.20 is vulnerable.
  • Uninstall version 4.20 and perform a clean installation of the newer version to ensure the flaw is removed.
  • If an update is unavailable, restrict access to the License Activation Name field by limiting user privileges or disabling the feature via configuration.
  • Configure firewall or host-based rules to block outbound connections on port 3110 to prevent potential bind-shell activity.
  • Apply general Windows security hardening, including regularly installing platform updates, using application whitelisting, and monitoring for suspicious local processes.

Generated by OpenCVE AI on March 22, 2026 at 14:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Lavavosoftware
Lavavosoftware lavavo Cd Ripper
Vendors & Products Lavavosoftware
Lavavosoftware lavavo Cd Ripper

Sun, 22 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description Lavavo CD Ripper 4.20 contains a structured exception handling (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string in the License Activation Name field. Attackers can craft a payload with controlled buffer data, NSEH jump instructions, and SEH handler addresses to trigger code execution and establish a bind shell on port 3110.
Title Lavavo CD Ripper 4.20 Local SEH Buffer Overflow
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Lavavosoftware Lavavo Cd Ripper
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-25T13:43:51.382Z

Reserved: 2026-03-22T13:27:16.749Z

Link: CVE-2019-25615

cve-icon Vulnrichment

Updated: 2026-03-25T13:43:46.620Z

cve-icon NVD

Status : Deferred

Published: 2026-03-22T14:16:30.117

Modified: 2026-04-16T16:19:50.757

Link: CVE-2019-25615

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:50:43Z

Weaknesses