CVE-2020-37200
Undergoing Analysis Undergoing Analysis - In Progress
Buffer Overflow in NetShareWatcher 1.5.8.0 Causes Application Crash

Publication date: 2026-02-11

Last updated on: 2026-02-17

Assigner: VulnCheck

Description
NetShareWatcher 1.5.8.0 contains a buffer overflow vulnerability in the registration key input that allows attackers to crash the application by supplying oversized input. Attackers can generate a 1000-character payload and paste it into the registration key field to trigger an application crash.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-11
Last Modified
2026-02-17
Generated
2026-05-07
AI Q&A
2026-02-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nsasoft netsharewatcher 1.5.8.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2020-37200 is a buffer overflow vulnerability in NetShareWatcher version 1.5.8.0. It occurs in the registration key input field where the software does not properly handle an oversized input.

An attacker can supply a specially crafted payload of about 1000 characters into the registration key field, which causes the application to crash due to a buffer overflow.

This vulnerability leads to a denial of service (DoS) condition by crashing the application when the oversized input is processed.


How can this vulnerability impact me? :

The primary impact of this vulnerability is a denial of service (DoS) condition.

An attacker can cause the NetShareWatcher application to crash by providing an oversized input in the registration key field, which disrupts normal operation.

This can lead to loss of availability of the application, potentially interrupting monitoring or management tasks that rely on NetShareWatcher.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to reproduce the crash condition on the affected application, NetShareWatcher 1.5.8.0, by supplying an oversized input to the registration key field.'}, {'type': 'paragraph', 'content': 'A practical detection method involves running a proof-of-concept (PoC) exploit that generates a 1000-character payload and pasting it into the registration key field to see if the application crashes.'}, {'type': 'paragraph', 'content': 'The PoC steps include:'}, {'type': 'list_item', 'content': 'Download and install NetShareWatcher version 1.5.8.0.'}, {'type': 'list_item', 'content': 'Run a Python script to generate a file named "poc.txt" containing 1000 "A" characters.'}, {'type': 'list_item', 'content': 'Launch NetShareWatcher and open the registration interface.'}, {'type': 'list_item', 'content': 'Copy the contents of "poc.txt" and paste them into the registration key field.'}, {'type': 'list_item', 'content': 'Click "Ok" and observe if the application crashes, indicating the presence of the vulnerability.'}] [1, 2]


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart