top of page
perceptive_background_267k.jpg

PassFab RAR Password Recovery 9.3.2 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary…

Published:

25 maart 2026 om 23:00:00

Alert date:

26 maart 2026 om 16:11:28

Source:

nvd.nist.gov

Click to open the original link from this advisory

Security Tools

CVE-2018-25218 affects PassFab RAR Password Recovery version 9.3.2, containing a structured exception handler (SEH) buffer overflow vulnerability. Local attackers can execute arbitrary code by supplying a malicious payload through the 'Licensed E-mail and Registration Code' field during registration. The vulnerability allows crafting of payloads with buffer overflow, NSEH jump, and shellcode components. This represents a significant security risk for users of the affected password recovery software. The vulnerability has been documented with proof-of-concept exploits available.

Technical details

Mitigation steps:

Affected products:

PassFab RAR Password Recovery

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page