2026-02-06 23:14CVE-2020-37171VulnCheck
PUBLISHED5.2CWE-120

TapinRadio 2.12.3 - 'username' Denial of Service

TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy username configuration that allows local attackers to crash the application. Attackers can overwrite the username field with 10,000 bytes of arbitrary data to trigger an application crash and prevent normal program functionality.

Problem type

Affected products

Raimersoft

TapinRadio

2.12.3 - AFFECTED

References

GitHub Security Advisories

GHSA-rgq9-pp26-h3f9

TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy username...

https://github.com/advisories/GHSA-rgq9-pp26-h3f9

TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy username configuration that allows local attackers to crash the application. Attackers can overwrite the username field with 10,000 bytes of arbitrary data to trigger an application crash and prevent normal program functionality.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2020-37171
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2020-37171",
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "dateUpdated": "2026-02-06T23:14:13.743Z",
    "dateReserved": "2026-02-06T12:31:16.221Z",
    "datePublished": "2026-02-06T23:14:13.743Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck",
        "dateUpdated": "2026-02-06T23:14:13.743Z"
      },
      "datePublic": "2020-02-05T00:00:00.000Z",
      "title": "TapinRadio 2.12.3 - 'username' Denial of Service",
      "descriptions": [
        {
          "lang": "en",
          "value": "TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy username configuration that allows local attackers to crash the application. Attackers can overwrite the username field with 10,000 bytes of arbitrary data to trigger an application crash and prevent normal program functionality."
        }
      ],
      "affected": [
        {
          "vendor": "Raimersoft",
          "product": "TapinRadio",
          "versions": [
            {
              "version": "2.12.3",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
              "cweId": "CWE-120",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://www.exploit-db.com/exploits/48013",
          "name": "ExploitDB-48013",
          "tags": [
            "exploit"
          ]
        },
        {
          "url": "https://www.raimersoft.com/php/tapinradio.php",
          "name": "TapinRadio Product Webpage",
          "tags": [
            "product"
          ]
        },
        {
          "url": "https://www.vulncheck.com/advisories/tapinradio-username-denial-of-service",
          "name": "VulnCheck Advisory: TapinRadio 2.12.3 - 'username' Denial of Service",
          "tags": [
            "third-party-advisory"
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS"
        },
        {
          "format": "CVSS",
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "attackVector": "LOCAL",
            "attackComplexity": "LOW",
            "privilegesRequired": "NONE",
            "userInteraction": "NONE",
            "scope": "UNCHANGED",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM"
          }
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "chuyreds",
          "type": "finder"
        }
      ]
    }
  }
}