Skip to main content

CVE-2025-34128: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in X360Soft X360 VideoPlayer ActiveX Control

High
VulnerabilityCVE-2025-34128cvecve-2025-34128cwe-120cwe-94
Published: Wed Jul 16 2025 (07/16/2025, 21:10:31 UTC)
Source: CVE Database V5
Vendor/Project: X360Soft
Product: X360 VideoPlayer ActiveX Control

Description

A buffer overflow vulnerability exists in the X360 VideoPlayer ActiveX control (VideoPlayer.ocx) version 2.6 when handling overly long arguments to the ConvertFile() method. An attacker can exploit this vulnerability by supplying crafted input to cause memory corruption and execute arbitrary code within the context of the current process.

AI-Powered Analysis

AILast updated: 07/16/2025, 21:46:11 UTC

Technical Analysis

CVE-2025-34128 is a high-severity buffer overflow vulnerability identified in the X360 VideoPlayer ActiveX Control (VideoPlayer.ocx) version 2.6, developed by X360Soft. The vulnerability arises from improper handling of input size in the ConvertFile() method, where the control fails to check the length of arguments before copying them into a buffer. This classic buffer overflow (CWE-120) can lead to memory corruption, enabling an attacker to execute arbitrary code within the context of the current process. The vulnerability does not require any privileges or authentication but does require user interaction, such as visiting a malicious website or opening a crafted file that triggers the vulnerable ActiveX control. The CVSS 4.0 base score is 8.6, reflecting a high severity due to the network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality, integrity, and availability. The vulnerability is particularly dangerous because ActiveX controls run with the privileges of the hosting application, often Internet Explorer or legacy Windows applications, potentially allowing full system compromise if exploited. No patches or fixes have been published yet, and no known exploits are currently in the wild, though the vulnerability is publicly disclosed and could be targeted by attackers in the near future. The vulnerability also relates to CWE-94 (Improper Control of Generation of Code), indicating potential risks of code injection or execution beyond simple memory corruption. Given the widespread use of ActiveX controls in legacy enterprise environments, this vulnerability poses a significant risk to affected systems.

Potential Impact

For European organizations, the impact of CVE-2025-34128 could be substantial, especially in sectors relying on legacy Windows environments and applications that embed ActiveX controls, such as government agencies, financial institutions, and industrial enterprises. Exploitation could lead to unauthorized code execution, data breaches, disruption of services, and potential lateral movement within networks. The vulnerability's ability to compromise confidentiality, integrity, and availability means sensitive data could be exfiltrated or corrupted, and critical systems could be taken offline or manipulated. Since the exploit requires user interaction, phishing or social engineering campaigns targeting European users could be effective attack vectors. Additionally, organizations with compliance requirements under GDPR and other data protection regulations could face legal and financial repercussions if breaches occur due to this vulnerability. The lack of a patch increases the urgency for mitigation to prevent exploitation in environments where the vulnerable ActiveX control is deployed.

Mitigation Recommendations

European organizations should take immediate steps to mitigate the risk posed by CVE-2025-34128 beyond generic advice. First, conduct an inventory to identify all systems and applications using X360 VideoPlayer ActiveX Control version 2.6. Where possible, disable or unregister the vulnerable ActiveX control to prevent its use. If disabling is not feasible, restrict the execution of ActiveX controls through Group Policy or browser security settings, especially in Internet Explorer or legacy browsers still in use. Implement application whitelisting to block unauthorized or unknown ActiveX controls from running. Employ network-level controls such as web filtering to block access to malicious sites that could host exploit code. Enhance user awareness training focused on phishing and social engineering tactics that might trigger the vulnerability. Monitor endpoint and network logs for unusual activity indicative of exploitation attempts. Engage with X360Soft for updates or patches and plan for rapid deployment once available. Consider isolating legacy systems in segmented network zones to limit potential lateral movement if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.561Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68781a21a83201eaacded295

Added to database: 7/16/2025, 9:31:13 PM

Last enriched: 7/16/2025, 9:46:11 PM

Last updated: 7/16/2025, 9:46:11 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats