CVE-2020-37025
Buffer Overflow in Port Forwarding Wizard 4.8.0 Enables Code Execution
Publication date: 2026-01-30
Last updated on: 2026-01-30
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| port_forwarding_wizard | port_forwarding_wizard | 4.8.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
Port Forwarding Wizard 4.8.0 has a buffer overflow vulnerability in its Register feature. This flaw allows local attackers to send an overly long request containing a specially crafted payload with an egg tag, which can overwrite Structured Exception Handler (SEH) pointers. By doing so, attackers can execute arbitrary code, such as shellcode, on the affected Windows system.
How can this vulnerability impact me? :
This vulnerability can allow a local attacker to execute arbitrary code on your Windows system, potentially leading to full system compromise. This could result in unauthorized access, data theft, system instability, or further malware installation.