


Perceptive Security
SOC/SIEM Consultancy

PassFab RAR Password Recovery 9.3.2 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary…
Published:
25 maart 2026 om 23:00:00
Alert date:
26 maart 2026 om 16:11:28
Source:
nvd.nist.gov
Security Tools
CVE-2018-25218 affects PassFab RAR Password Recovery version 9.3.2, containing a structured exception handler (SEH) buffer overflow vulnerability. Local attackers can execute arbitrary code by supplying a malicious payload through the 'Licensed E-mail and Registration Code' field during registration. The vulnerability allows crafting of payloads with buffer overflow, NSEH jump, and shellcode components. This represents a significant security risk for users of the affected password recovery software. The vulnerability has been documented with proof-of-concept exploits available.
Technical details
Mitigation steps:
Affected products:
PassFab RAR Password Recovery
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2018-25218
https://www.exploit-db.com/exploits/46008
https://www.passfab.com/downloads/passfab-rar-password-recovery.exe
https://www.passfab.com/products/rar-password-recovery.html
https://www.vulncheck.com/advisories/passfab-rar-password-recovery-seh-buffer-overflow
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
