2026-03-26 13:24CVE-2018-25212VulnCheck
PUBLISHED5.2CWE-787

Boxoft wav-wma Converter 1.0 Local Buffer Overflow SEH

Boxoft wav-wma Converter 1.0 contains a local buffer overflow vulnerability in structured exception handling that allows attackers to execute arbitrary code by crafting malicious WAV files. Attackers can create a specially crafted WAV file with excessive data and ROP gadgets to overwrite the SEH chain and achieve code execution on Windows systems.

Problem type

Affected products

Boxoft

WAV to WMA Converter

1.0 - AFFECTED

References

JSON source

https://cveawg.mitre.org/api/cve/CVE-2018-25212
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2018-25212",
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "dateUpdated": "2026-03-26T13:24:13.757Z",
    "dateReserved": "2026-03-26T13:13:57.189Z",
    "datePublished": "2026-03-26T13:24:13.757Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck",
        "dateUpdated": "2026-03-26T13:24:13.757Z"
      },
      "datePublic": "2018-07-08T00:00:00.000Z",
      "title": "Boxoft wav-wma Converter 1.0 Local Buffer Overflow SEH",
      "descriptions": [
        {
          "lang": "en",
          "value": "Boxoft wav-wma Converter 1.0 contains a local buffer overflow vulnerability in structured exception handling that allows attackers to execute arbitrary code by crafting malicious WAV files. Attackers can create a specially crafted WAV file with excessive data and ROP gadgets to overwrite the SEH chain and achieve code execution on Windows systems."
        }
      ],
      "affected": [
        {
          "vendor": "Boxoft",
          "product": "WAV to WMA Converter",
          "versions": [
            {
              "version": "1.0",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Out-of-bounds Write",
              "cweId": "CWE-787",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://www.exploit-db.com/exploits/44989",
          "name": "ExploitDB-44989",
          "tags": [
            "exploit"
          ]
        },
        {
          "url": "http://www.boxoft.com/wav-to-wma/",
          "name": "Product Reference",
          "tags": [
            "product"
          ]
        },
        {
          "url": "https://www.vulncheck.com/advisories/boxoft-wav-wma-converter-local-buffer-overflow-seh",
          "name": "VulnCheck Advisory: Boxoft wav-wma Converter 1.0 Local Buffer Overflow SEH",
          "tags": [
            "third-party-advisory"
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS"
        },
        {
          "format": "CVSS",
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "attackVector": "LOCAL",
            "attackComplexity": "LOW",
            "privilegesRequired": "NONE",
            "userInteraction": "NONE",
            "scope": "UNCHANGED",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "availabilityImpact": "HIGH",
            "baseScore": 8.4,
            "baseSeverity": "HIGH"
          }
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Achilles",
          "type": "finder"
        }
      ]
    }
  }
}