CVE-2020-37171

TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy username configuration that allows local attackers to crash the application. Attackers can overwrite the username field with 10,000 bytes of arbitrary data to trigger an application crash and prevent normal program functionality.
Configurations

Configuration 1 (hide)

cpe:2.3:a:raimersoft:tapinradio:*:*:*:*:*:*:*:*

History

19 Feb 2026, 19:29

Type Values Removed Values Added
First Time Raimersoft
Raimersoft tapinradio
CPE cpe:2.3:a:raimersoft:tapinradio:*:*:*:*:*:*:*:*
References () https://www.exploit-db.com/exploits/48013 - () https://www.exploit-db.com/exploits/48013 - Exploit, Third Party Advisory, VDB Entry
References () https://www.raimersoft.com/php/tapinradio.php - () https://www.raimersoft.com/php/tapinradio.php - Product
References () https://www.vulncheck.com/advisories/tapinradio-username-denial-of-service - () https://www.vulncheck.com/advisories/tapinradio-username-denial-of-service - Third Party Advisory

07 Feb 2026, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-07 00:15

Updated : 2026-02-19 19:29


NVD link : CVE-2020-37171

Mitre link : CVE-2020-37171

CVE.ORG link : CVE-2020-37171


JSON object : View

Products Affected

raimersoft

  • tapinradio
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')