CVE-2020-37171

TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy username configuration that allows local attackers to crash the application. Attackers can overwrite the username field with 10,000 bytes of arbitrary data to trigger an application crash and prevent normal program functionality.
Configurations

Configuration 1 (hide)

cpe:2.3:a:raimersoft:tapinradio:*:*:*:*:*:*:*:*

History

19 Feb 2026, 19:29

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/48013 - () https://www.exploit-db.com/exploits/48013 - Exploit, Third Party Advisory, VDB Entry
References () https://www.raimersoft.com/php/tapinradio.php - () https://www.raimersoft.com/php/tapinradio.php - Product
References () https://www.vulncheck.com/advisories/tapinradio-username-denial-of-service - () https://www.vulncheck.com/advisories/tapinradio-username-denial-of-service - Third Party Advisory
First Time Raimersoft tapinradio
Raimersoft
CPE cpe:2.3:a:raimersoft:tapinradio:*:*:*:*:*:*:*:*

07 Feb 2026, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-07 00:15

Updated : 2026-02-19 19:29


NVD link : CVE-2020-37171

Mitre link : CVE-2020-37171

CVE.ORG link : CVE-2020-37171


JSON object : View

Products Affected

raimersoft

  • tapinradio
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')