CVE-2020-37182

Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length checking to overwrite memory and cause a segmentation fault, resulting in program termination.
Configurations

No configuration.

History

11 Feb 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-11 21:16

Updated : 2026-02-12 15:10


NVD link : CVE-2020-37182

Mitre link : CVE-2020-37182

CVE.ORG link : CVE-2020-37182


JSON object : View

Products Affected

No product.

CWE
CWE-121

Stack-based Buffer Overflow