TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy address configuration that allows local attackers to crash the application. Attackers can overwrite the address field with 3000 bytes of arbitrary data to trigger an application crash and prevent normal program functionality.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/48011 | Exploit Third Party Advisory VDB Entry |
| https://www.raimersoft.com/php/tapinradio.php | Product |
| https://www.vulncheck.com/advisories/tapinradio-address-denial-of-service | Third Party Advisory |
Configurations
History
19 Feb 2026, 19:30
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:raimersoft:tapinradio:*:*:*:*:*:*:*:* |
19 Feb 2026, 19:23
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.exploit-db.com/exploits/48011 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.raimersoft.com/php/tapinradio.php - Product | |
| References | () https://www.vulncheck.com/advisories/tapinradio-address-denial-of-service - Third Party Advisory | |
| CPE | cpe:2.3:a:raimersoft:tapinradio:2.12.3:*:*:*:*:*:*:* | |
| First Time |
Raimersoft
Raimersoft tapinradio |
07 Feb 2026, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-07 00:15
Updated : 2026-02-19 19:30
NVD link : CVE-2020-37170
Mitre link : CVE-2020-37170
CVE.ORG link : CVE-2020-37170
JSON object : View
Products Affected
raimersoft
- tapinradio
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
