Tomabo MP4 Converter 3.25.22 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Name field. Attackers can trigger a buffer overflow by pasting a large payload into the Name parameter when adding a preset in the Video/Audio Formats options, causing the application to crash when Reset All is clicked.
History

Sat, 21 Mar 2026 13:00:00 +0000

Type Values Removed Values Added
Description Tomabo MP4 Converter 3.25.22 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Name field. Attackers can trigger a buffer overflow by pasting a large payload into the Name parameter when adding a preset in the Video/Audio Formats options, causing the application to crash when Reset All is clicked.
Title Tomabo MP4 Converter 3.25.22 Denial of Service via Name Field
First Time appeared Ether Software
Ether Software easy Video To Mp4 Converter
Weaknesses CWE-787
CPEs cpe:2.3:a:ether_software:easy_video_to_mp4_converter:3.25.22:*:*:*:*:*:*:*
Vendors & Products Ether Software
Ether Software easy Video To Mp4 Converter
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-21T12:46:56.539Z

Reserved: 2026-03-21T12:29:19.364Z

Link: CVE-2019-25554

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-21T13:16:17.857

Modified: 2026-03-21T13:16:17.857

Link: CVE-2019-25554

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.