CVE-2020-37166

AbsoluteTelnet 11.12 contains a denial of service vulnerability in the SSH2 username input field that allows local attackers to crash the application. Attackers can overwrite the username field with a 1000-byte buffer, causing the application to become unresponsive and terminate.
Configurations

Configuration 1 (hide)

cpe:2.3:a:celestialsoftware:absolutetelnet:11.12:*:*:*:*:*:*:*

History

19 Feb 2026, 18:52

Type Values Removed Values Added
CPE cpe:2.3:a:celestialsoftware:absolutetelnet:11.12:*:*:*:*:*:*:*
References () https://www.celestialsoftware.net/ - () https://www.celestialsoftware.net/ - Product
References () https://www.exploit-db.com/exploits/48010 - () https://www.exploit-db.com/exploits/48010 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/absolutetelnet-sshusername-denial-of-service - () https://www.vulncheck.com/advisories/absolutetelnet-sshusername-denial-of-service - Broken Link
First Time Celestialsoftware
Celestialsoftware absolutetelnet

07 Feb 2026, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-07 00:15

Updated : 2026-02-19 18:52


NVD link : CVE-2020-37166

Mitre link : CVE-2020-37166

CVE.ORG link : CVE-2020-37166


JSON object : View

Products Affected

celestialsoftware

  • absolutetelnet
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')