CVE-2020-37039
Denial of Service in Frigate 2.02 via Oversized CLI Input
Publication date: 2026-01-30
Last updated on: 2026-01-30
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| unknown_vendor | frigate | 2.02 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Frigate 2.02 is a denial of service issue where an attacker can crash the application by sending an oversized input to its command line interface. Specifically, by inputting a payload of 8000 repeated characters into the command line field, the application crashes.
How can this vulnerability impact me? :
The impact of this vulnerability is that an attacker can cause the Frigate application to crash, resulting in a denial of service. This means legitimate users may be unable to use the application while it is down.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid sending oversized input (such as 8000 repeated characters) to the application's command line interface to prevent triggering a crash. Implement input validation or limit input size in the command line interface to prevent denial of service attacks.