No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 19 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:raimersoft:tapinradio:*:*:*:*:*:*:*:* |
Tue, 17 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 10 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Raimersoft
Raimersoft tapinradio |
|
| Vendors & Products |
Raimersoft
Raimersoft tapinradio |
Fri, 06 Feb 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy username configuration that allows local attackers to crash the application. Attackers can overwrite the username field with 10,000 bytes of arbitrary data to trigger an application crash and prevent normal program functionality. | |
| Title | TapinRadio 2.12.3 - 'username' Denial of Service | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-17T16:54:04.150Z
Reserved: 2026-02-06T12:31:16.221Z
Link: CVE-2020-37171
Updated: 2026-02-10T20:33:46.292Z
Status : Analyzed
Published: 2026-02-07T00:15:57.460
Modified: 2026-02-19T19:29:30.633
Link: CVE-2020-37171
No data.
OpenCVE Enrichment
Updated: 2026-02-09T10:45:17Z