No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 19 Feb 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:raimersoft:tapinradio:*:*:*:*:*:*:*:* |
Thu, 19 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:raimersoft:tapinradio:2.12.3:*:*:*:*:*:*:* |
Tue, 17 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 10 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Raimersoft
Raimersoft tapinradio |
|
| Vendors & Products |
Raimersoft
Raimersoft tapinradio |
Fri, 06 Feb 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy address configuration that allows local attackers to crash the application. Attackers can overwrite the address field with 3000 bytes of arbitrary data to trigger an application crash and prevent normal program functionality. | |
| Title | TapinRadio 2.12.3 - 'address' Denial of Service | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-17T16:54:31.380Z
Reserved: 2026-02-06T12:30:55.920Z
Link: CVE-2020-37170
Updated: 2026-02-10T20:33:47.686Z
Status : Analyzed
Published: 2026-02-07T00:15:57.287
Modified: 2026-02-19T19:30:12.490
Link: CVE-2020-37170
No data.
OpenCVE Enrichment
Updated: 2026-02-09T10:45:01Z