Cyberoam Authentication Client 2.1.2.7 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) memory. Attackers can craft a malicious input in the 'Cyberoam Server Address' field to trigger a bind TCP shell on port 1337 with system-level access.
References
Configurations
No configuration.
History
07 Feb 2026, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-07 00:15
Updated : 2026-02-09 16:08
NVD link : CVE-2020-37095
Mitre link : CVE-2020-37095
CVE.ORG link : CVE-2020-37095
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow
