TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy username configuration that allows local attackers to crash the application. Attackers can overwrite the username field with 10,000 bytes of arbitrary data to trigger an application crash and prevent normal program functionality.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/48013 | Exploit Third Party Advisory VDB Entry |
| https://www.raimersoft.com/php/tapinradio.php | Product |
| https://www.vulncheck.com/advisories/tapinradio-username-denial-of-service | Third Party Advisory |
Configurations
History
19 Feb 2026, 19:29
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Raimersoft
Raimersoft tapinradio |
|
| CPE | cpe:2.3:a:raimersoft:tapinradio:*:*:*:*:*:*:*:* | |
| References | () https://www.exploit-db.com/exploits/48013 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.raimersoft.com/php/tapinradio.php - Product | |
| References | () https://www.vulncheck.com/advisories/tapinradio-username-denial-of-service - Third Party Advisory |
07 Feb 2026, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-07 00:15
Updated : 2026-02-19 19:29
NVD link : CVE-2020-37171
Mitre link : CVE-2020-37171
CVE.ORG link : CVE-2020-37171
JSON object : View
Products Affected
raimersoft
- tapinradio
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
