Home

Description

Terminal Services Manager 3.1 contains a stack-based buffer overflow vulnerability in the computer names field that allows local attackers to execute arbitrary code by triggering structured exception handling. Attackers can craft a malicious input file with shellcode and jump instructions that overwrite the SEH handler pointer to execute calc.exe or other payloads when imported through the add computers wizard.

PUBLISHED Reserved 2026-04-22 | Published 2026-04-22 | Updated 2026-04-23 | Assigner VulnCheck




HIGH: 8.6CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.4CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Missing Authentication for Critical Function

Product status

3.1
affected

Credits

bzyo finder

References

www.exploit-db.com/exploits/46058 (ExploitDB-46058) exploit

lizardsystems.com (Official Product Homepage) product

www.vulncheck.com/...al-services-manager-buffer-overflow-seh (VulnCheck Advisory: Terminal Services Manager 3.1 Buffer Overflow SEH) third-party-advisory

cve.org (CVE-2018-25259)

nvd.nist.gov (CVE-2018-25259)

Download JSON