Description
A stack-based buffer overflow vulnerability exists in VideoCharge Studio 2.12.3.685 when processing a specially crafted .VSC configuration file. The issue occurs due to improper handling of user-supplied data in the XML 'Name' attribute, leading to an SEH overwrite condition. An attacker can exploit this vulnerability by convincing a user to open a malicious .VSC file, resulting in arbitrary code execution under the context of the user.
Published: 2025-07-16
Score: 8.4 High
EPSS: 8.7% Low
KEV: No
Impact: Remote Code Execution
Action: Assess Impact
AI Analysis

Impact

VideoCharge Studio 2.12.3.685 suffers a stack-based buffer overflow triggered by a specially crafted .VSC configuration file. The vulnerability is caused by improper validation of user supplied data within the XML 'Name' attribute, which overwrites the Structured Exception Handler and gives an attacker the ability to write arbitrary code on the stack. The weakness corresponds to CWE-121, CWE-20, and CWE-94 and enables execution of attacker supplied payload with the privileges of the user who opens the file.

Affected Systems

The affected product is VideoCharge Software:Studio, version 2.12.3.685. No other products or versions were indicated as vulnerable.

Risk and Exploitability

The CVSS score is 8.4 and the EPSS score of 9% indicates a moderate probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a local file execution scenario where an adversary convinces an end‑user to open a malicious .VSC file, resulting in arbitrary code execution under the user’s context.

Generated by OpenCVE AI on April 22, 2026 at 22:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update VideoCharge Studio to a version that addresses the SEH overflow or is otherwise patched for this vulnerability
  • Disallow or strictly control the opening of .VSC files from untrusted or unknown sources, for example by implementing file type whitelisting or user training
  • Apply application whitelisting or sandboxing to restrict the execution of untrusted binaries that could contain exploit code

Generated by OpenCVE AI on April 22, 2026 at 22:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-21748 A stack-based buffer overflow vulnerability exists in VideoCharge Studio 2.12.3.685 when processing a specially crafted .VSC configuration file. The issue occurs due to improper handling of user-supplied data in the XML 'Name' attribute, leading to an SEH overwrite condition. An attacker can exploit this vulnerability by convincing a user to open a malicious .VSC file, resulting in arbitrary code execution under the context of the user.
History

Wed, 19 Nov 2025 01:30:00 +0000

Type Values Removed Values Added
First Time appeared Videocharge
Videocharge videocharge Studio
CPEs cpe:2.3:a:videocharge:videocharge_studio:2.12.3.685:*:*:*:*:*:*:*
Vendors & Products Videocharge
Videocharge videocharge Studio

Thu, 17 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
Description A stack-based buffer overflow vulnerability exists in VideoCharge Studio 2.12.3.685 when processing a specially crafted .VSC configuration file. The issue occurs due to improper handling of user-supplied data in the XML 'Name' attribute, leading to an SEH overwrite condition. An attacker can exploit this vulnerability by convincing a user to open a malicious .VSC file, resulting in arbitrary code execution under the context of the user.
Title VideoCharge Studio 2.12.3.685 SEH Buffer Overflow via .VSC File
Weaknesses CWE-121
CWE-20
CWE-94
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Videocharge Videocharge Studio
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:09:43.657Z

Reserved: 2025-04-15T19:15:22.561Z

Link: CVE-2025-34123

cve-icon Vulnrichment

Updated: 2025-07-17T19:42:10.667Z

cve-icon NVD

Status : Deferred

Published: 2025-07-16T21:15:27.227

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-34123

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T22:30:28Z

Weaknesses