Impact
River Past Audio Converter 7.7.16 has a local buffer overflow in the activation code field. A user can enter an oversized input string containing repeated characters and trigger a crash by clicking the Activate button. The vulnerability does not allow remote code execution or data exfiltration; its effect is limited to disrupting the availability of the application.
Affected Systems
The affected product is River Past Audio Converter version 7.7.16 from the vendor River Past Audio Converter. No other affected versions are listed in the data.
Risk and Exploitability
The CVSS score of 6.8 indicates moderate severity, and the lack of an EPSS value or KEV listing suggests a lower likelihood of widespread exploitation. The attack vector is local, requiring that an attacker has access to the user’s workstation or can run the application. Because the flaw only causes a denial of service, the impact is confined to service interruption rather than data compromise. Given the moderate score and local accessibility, the risk is considered moderate but should be mitigated promptly if the application is used in critical environments.
OpenCVE Enrichment