A stack-based buffer overflow vulnerability exists in VideoCharge Studio 2.12.3.685 when processing a specially crafted .VSC configuration file. The issue occurs due to improper handling of user-supplied data in the XML 'Name' attribute, leading to an SEH overwrite condition. An attacker can exploit this vulnerability by convincing a user to open a malicious .VSC file, resulting in arbitrary code execution under the context of the user.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 17 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
Description A stack-based buffer overflow vulnerability exists in VideoCharge Studio 2.12.3.685 when processing a specially crafted .VSC configuration file. The issue occurs due to improper handling of user-supplied data in the XML 'Name' attribute, leading to an SEH overwrite condition. An attacker can exploit this vulnerability by convincing a user to open a malicious .VSC file, resulting in arbitrary code execution under the context of the user.
Title VideoCharge Studio 2.12.3.685 SEH Buffer Overflow via .VSC File
Weaknesses CWE-121
CWE-20
CWE-94
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-07-17T19:43:00.462Z

Reserved: 2025-04-15T19:15:22.561Z

Link: CVE-2025-34123

cve-icon Vulnrichment

Updated: 2025-07-17T19:42:10.667Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-16T21:15:27.227

Modified: 2025-07-17T21:15:50.197

Link: CVE-2025-34123

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.