Home

Description

a-Mac Address Change 5.4 contains a local buffer overflow vulnerability that allows local attackers to crash the application by supplying oversized input to registration form fields. Attackers can paste 212 bytes of data into the 'Your Name', 'Your Company', or 'Register Code' fields and click the Register button to trigger a denial of service crash.

PUBLISHED Reserved 2026-04-05 | Published 2026-04-05 | Updated 2026-04-06 | Assigner VulnCheck




MEDIUM: 6.8CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Problem types

Out-of-bounds Write

Product status

5.4
affected

Credits

Rafael Pedrero finder

References

www.exploit-db.com/exploits/46292 (ExploitDB-46292) exploit

amac.paqtool.com/ (Official Product Homepage) product

www.vulncheck.com/...ddress-change-local-buffer-overflow-dos (VulnCheck Advisory: a-Mac Address Change 5.4 Local Buffer Overflow DoS) third-party-advisory

cve.org (CVE-2019-25658)

nvd.nist.gov (CVE-2019-25658)

Download JSON