Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length checking to overwrite memory and cause a segmentation fault, resulting in program termination.
References
Configurations
No configuration.
History
11 Feb 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-11 21:16
Updated : 2026-02-12 15:10
NVD link : CVE-2020-37182
Mitre link : CVE-2020-37182
CVE.ORG link : CVE-2020-37182
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow
