CVE-2020-37162

Wedding Slideshow Studio 1.36 contains a buffer overflow vulnerability in the registration key input that allows attackers to execute arbitrary code by overwriting memory. Attackers can craft a malicious payload of 1608 bytes to trigger a stack-based buffer overflow and execute commands through the registration key field.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wedding-slideshow-studio:wedding_slideshow_studio:*:*:*:*:*:*:*:*

History

24 Feb 2026, 14:48

Type Values Removed Values Added
First Time Wedding-slideshow-studio
Wedding-slideshow-studio wedding Slideshow Studio
CPE cpe:2.3:a:wedding-slideshow-studio:wedding_slideshow_studio:*:*:*:*:*:*:*:*
References () https://web.archive.org/web/20200126071857/http://www.wedding-slideshow-studio.com/ - () https://web.archive.org/web/20200126071857/http://www.wedding-slideshow-studio.com/ - Product
References () https://www.exploit-db.com/exploits/48028 - () https://www.exploit-db.com/exploits/48028 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/wedding-slideshow-studio-key-buffer-overflow - () https://www.vulncheck.com/advisories/wedding-slideshow-studio-key-buffer-overflow - Third Party Advisory

07 Feb 2026, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-07 00:15

Updated : 2026-02-24 14:48


NVD link : CVE-2020-37162

Mitre link : CVE-2020-37162

CVE.ORG link : CVE-2020-37162


JSON object : View

Products Affected

wedding-slideshow-studio

  • wedding_slideshow_studio
CWE
CWE-122

Heap-based Buffer Overflow