


Perceptive Security
SOC/SIEM Consultancy

River Past CamDo 3.7.6 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supp…
Published:
25 maart 2026 om 23:00:00
Alert date:
26 maart 2026 om 15:03:18
Source:
nvd.nist.gov
Operating Systems
River Past CamDo 3.7.6 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code. The vulnerability is triggered by supplying a malicious string in the Lame_enc.dll name field. Attackers can craft a payload with a 280-byte buffer, NSEH jump instruction, and SEH handler address pointing to a pop-pop-ret gadget. Successful exploitation leads to code execution and establishment of a bind shell on port 3110. This is a local privilege escalation vulnerability affecting the multimedia software application.
Technical details
Mitigation steps:
Affected products:
River Past CamDo
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2019-25650
https://en.softonic.com/download/river-past-cam-do/windows/post-download?sl=1
https://www.exploit-db.com/exploits/46335
https://www.vulncheck.com/advisories/river-past-camdo-structured-exception-handler-buffer-overflow
Related CVE's:
Related threat actors:
IOC's:
port 3110
This article was created with the assistance of AI technology by Perceptive.
