Description
RealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH) buffer overflow vulnerability in the Echo Port tab that allows local attackers to execute arbitrary code by supplying a malicious payload. Attackers can craft a buffer overflow payload with a POP POP RET gadget chain and shellcode that triggers code execution when pasted into the Port field and the Change button is clicked.
Problem types
Product status
Credits
Matteo Malvica
References
www.exploit-db.com/exploits/46441 (ExploitDB-46441)
realterm.sourceforge.io/ (Official Product Homepage)
sourceforge.net/projects/realterm/files/ (Product Reference)
www.vulncheck.com/...erm-serial-terminal-buffer-overflow-seh (VulnCheck Advisory: RealTerm Serial Terminal 2.0.0.70 Buffer Overflow SEH)