Echo Mirage 3.1 contains a stack buffer overflow vulnerability that allows local attackers to crash the application or execute arbitrary code by supplying an oversized string in the Rules action field. Attackers can create a malicious text file with a crafted payload exceeding buffer boundaries and paste it into the action field through the Rules dialog to trigger the overflow and overwrite the return address.
History

Sun, 12 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
Description Echo Mirage 3.1 contains a stack buffer overflow vulnerability that allows local attackers to crash the application or execute arbitrary code by supplying an oversized string in the Rules action field. Attackers can create a malicious text file with a crafted payload exceeding buffer boundaries and paste it into the action field through the Rules dialog to trigger the overflow and overwrite the return address.
Title Echo Mirage 3.1 Stack Buffer Overflow via Rules Action Field
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-12T12:28:51.242Z

Reserved: 2026-04-05T15:39:09.009Z

Link: CVE-2019-25705

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-12T13:16:33.303

Modified: 2026-04-12T13:16:33.303

Link: CVE-2019-25705

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.