CVE-2020-37031
Buffer Overflow in Simple Startup Manager 1.17 Enables Code Execution
Publication date: 2026-01-30
Last updated on: 2026-01-30
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| unknown_vendor | simple_startup_manager | 1.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
Simple Startup Manager 1.17 has a local buffer overflow vulnerability in the 'File' input parameter. This flaw allows attackers to overwrite memory by providing a specially crafted payload of 268 bytes, which can lead to arbitrary code execution. Specifically, attackers can bypass Data Execution Prevention (DEP) and overwrite memory addresses to execute code such as launching calc.exe.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with local access to execute arbitrary code on the affected system. This could lead to unauthorized actions such as running malicious programs, compromising system integrity, and potentially gaining further control over the system.