Impact
River Past Cam Do 3.7.6 includes a local buffer overflow in the activation code input field, allowing local attackers to supply a malicious string that overflows a fixed‑size buffer and redirects execution to attacker‑provided shellcode. The exploit requires the attacker to interact with the activation dialog, providing a payload of 608 bytes followed by shellcode and overwritten SEH values, resulting in arbitrary code execution with the privileges of the running process.
Affected Systems
Flexhex River Past Cam Do version 3.7.6 is vulnerable to the described buffer overflow; any installation of this version must be patched, updated, or removed to prevent exploitation.
Risk and Exploitability
The CVSS score of 8.6 denotes high severity, while no EPSS data and no KEV listing mean the exploit probability is unknown. The vulnerability is local in nature, requiring attacker presence on the machine and interaction with the activation dialog, so the attack vector is local with a substantial potential impact if exploited.
OpenCVE Enrichment