A buffer overflow vulnerability exists in the X360 VideoPlayer ActiveX control (VideoPlayer.ocx) version 2.6 when handling overly long arguments to the ConvertFile() method. An attacker can exploit this vulnerability by supplying crafted input to cause memory corruption and execute arbitrary code within the context of the current process.
History

Thu, 17 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 21:45:00 +0000

Type Values Removed Values Added
References

Wed, 16 Jul 2025 21:30:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability exists in the X360 VideoPlayer ActiveX control (VideoPlayer.ocx) version 2.6 when handling overly long arguments to the ConvertFile() method. An attacker can exploit this vulnerability by supplying crafted input to cause memory corruption and execute arbitrary code within the context of the current process.
Title X360 VideoPlayer ActiveX Control Buffer Overflow via ConvertFile()
Weaknesses CWE-120
CWE-94
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-07-16T21:10:31.205Z

Updated: 2025-07-17T13:45:07.513Z

Reserved: 2025-04-15T19:15:22.561Z

Link: CVE-2025-34128

cve-icon Vulnrichment

Updated: 2025-07-17T13:45:03.820Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-16T22:15:24.410

Modified: 2025-07-17T21:15:50.197

Link: CVE-2025-34128

cve-icon Redhat

No data.