top of page
perceptive_background_267k.jpg

River Past CamDo 3.7.6 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supp…

Published:

25 March 2026 at 23:00:00

Alert date:

26 March 2026 at 15:03:18

Source:

nvd.nist.gov

Click to open the original link from this advisory

Operating Systems

River Past CamDo 3.7.6 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code. The vulnerability is triggered by supplying a malicious string in the Lame_enc.dll name field. Attackers can craft a payload with a 280-byte buffer, NSEH jump instruction, and SEH handler address pointing to a pop-pop-ret gadget. Successful exploitation leads to code execution and establishment of a bind shell on port 3110. This is a local privilege escalation vulnerability affecting the multimedia software application.

Technical details

Mitigation steps:

Affected products:

River Past CamDo

Related links:

Related CVE's:

Related threat actors:

IOC's:

port 3110

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page