CVE-2020-37031
Unknown Unknown - Not Provided
Buffer Overflow in Simple Startup Manager 1.17 Enables Code Execution

Publication date: 2026-01-30

Last updated on: 2026-01-30

Assigner: VulnCheck

Description
Simple Startup Manager 1.17 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting memory through the 'File' input parameter. Attackers can craft a malicious payload with 268 bytes to trigger code execution, bypassing DEP and overwriting memory addresses to launch calc.exe.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-30
Last Modified
2026-01-30
Generated
2026-05-07
AI Q&A
2026-01-31
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
unknown_vendor simple_startup_manager 1.17
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

Simple Startup Manager 1.17 has a local buffer overflow vulnerability in the 'File' input parameter. This flaw allows attackers to overwrite memory by providing a specially crafted payload of 268 bytes, which can lead to arbitrary code execution. Specifically, attackers can bypass Data Execution Prevention (DEP) and overwrite memory addresses to execute code such as launching calc.exe.


How can this vulnerability impact me? :

This vulnerability can allow an attacker with local access to execute arbitrary code on the affected system. This could lead to unauthorized actions such as running malicious programs, compromising system integrity, and potentially gaining further control over the system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart