Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.4

Control Center PRO 6.2.9 Allows Malicious Code Execution via Excessive Username Input

CVE-2019-25357
Summary

A critical security issue affects Control Center PRO 6.2.9, allowing an attacker to inject malicious code and potentially take control of a Windows system by entering a very long username. This could lead to unauthorized access and data theft. Update to the latest version of Control Center PRO to fix this issue.

Original title
Control Center PRO 6.2.9 contains a stack-based buffer overflow vulnerability in the user creation module's username field that allows attackers to overwrite Structured Exception Handler (SEH). Att...
Original description
Control Center PRO 6.2.9 contains a stack-based buffer overflow vulnerability in the user creation module's username field that allows attackers to overwrite Structured Exception Handler (SEH). Attackers can craft a malicious payload exceeding 664 bytes to inject shellcode and potentially execute arbitrary code on vulnerable Windows systems.
nvd CVSS3.1 8.4
nvd CVSS4.0 8.4
Vulnerability type
CWE-121 Stack-based Buffer Overflow
Published: 18 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026