CVE-2020-37170

TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy address configuration that allows local attackers to crash the application. Attackers can overwrite the address field with 3000 bytes of arbitrary data to trigger an application crash and prevent normal program functionality.
Configurations

Configuration 1 (hide)

cpe:2.3:a:raimersoft:tapinradio:*:*:*:*:*:*:*:*

History

19 Feb 2026, 19:30

Type Values Removed Values Added
CPE cpe:2.3:a:raimersoft:tapinradio:2.12.3:*:*:*:*:*:*:* cpe:2.3:a:raimersoft:tapinradio:*:*:*:*:*:*:*:*

19 Feb 2026, 19:23

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/48011 - () https://www.exploit-db.com/exploits/48011 - Exploit, Third Party Advisory, VDB Entry
References () https://www.raimersoft.com/php/tapinradio.php - () https://www.raimersoft.com/php/tapinradio.php - Product
References () https://www.vulncheck.com/advisories/tapinradio-address-denial-of-service - () https://www.vulncheck.com/advisories/tapinradio-address-denial-of-service - Third Party Advisory
CPE cpe:2.3:a:raimersoft:tapinradio:2.12.3:*:*:*:*:*:*:*
First Time Raimersoft
Raimersoft tapinradio

07 Feb 2026, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-07 00:15

Updated : 2026-02-19 19:30


NVD link : CVE-2020-37170

Mitre link : CVE-2020-37170

CVE.ORG link : CVE-2020-37170


JSON object : View

Products Affected

raimersoft

  • tapinradio
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')