CVE-2020-37013
Buffer Overflow in Audio Playback Recorder 3.2.2 Enables Code Execution
Publication date: 2026-01-29
Last updated on: 2026-01-29
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tongsoft | audio_playback_recorder | 3.2.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2020-37013 is a local buffer overflow vulnerability in Audio Playback Recorder version 3.2.2, specifically affecting the "eject" and "registration" input parameters. Attackers can craft malicious payloads that overwrite the Structured Exception Handler (SEH) by pasting specially crafted input into the application's input fields. This allows execution of arbitrary code, such as running shellcode, when the overwritten SEH is triggered. [1, 4]
How can this vulnerability impact me? :
This vulnerability can allow an attacker with local access to execute arbitrary code on the affected system by exploiting the buffer overflow in the Audio Playback Recorder application. This could lead to unauthorized actions such as running malicious programs, potentially compromising the system's integrity and security. [1, 4]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability is a local buffer overflow in Audio Playback Recorder 3.2.2 triggered by pasting specially crafted input into the application's 'eject' and 'registration' input fields. Detection involves verifying if the vulnerable version (3.2.2) of Audio Playback Recorder is installed on the system. Since it is a local vulnerability requiring user interaction, network detection is not applicable. There are no specific commands provided to detect exploitation attempts. However, you can check the installed software version and monitor for unusual application crashes or behavior when using the 'eject' or 'registration' features. [1, 4]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1) Avoid using the 'eject' and 'registration' input fields in Audio Playback Recorder 3.2.2 with untrusted or unknown input, especially avoiding pasting data into these fields. 2) If possible, update or patch the software to a version that fixes this vulnerability (no fixed version is mentioned, so consider removing or restricting use of the vulnerable application). 3) Limit user privileges to prevent unauthorized execution of the vulnerable application. 4) Monitor and restrict clipboard usage related to this application to prevent malicious payload pasting. 5) Consider disabling or uninstalling Audio Playback Recorder 3.2.2 until a fix is available. [1, 4]