CVE-2020-37200
Buffer Overflow in NetShareWatcher 1.5.8.0 Causes Application Crash
Publication date: 2026-02-11
Last updated on: 2026-02-17
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nsasoft | netsharewatcher | 1.5.8.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2020-37200 is a buffer overflow vulnerability in NetShareWatcher version 1.5.8.0. It occurs in the registration key input field where the software does not properly handle an oversized input.
An attacker can supply a specially crafted payload of about 1000 characters into the registration key field, which causes the application to crash due to a buffer overflow.
This vulnerability leads to a denial of service (DoS) condition by crashing the application when the oversized input is processed.
How can this vulnerability impact me? :
The primary impact of this vulnerability is a denial of service (DoS) condition.
An attacker can cause the NetShareWatcher application to crash by providing an oversized input in the registration key field, which disrupts normal operation.
This can lead to loss of availability of the application, potentially interrupting monitoring or management tasks that rely on NetShareWatcher.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to reproduce the crash condition on the affected application, NetShareWatcher 1.5.8.0, by supplying an oversized input to the registration key field.'}, {'type': 'paragraph', 'content': 'A practical detection method involves running a proof-of-concept (PoC) exploit that generates a 1000-character payload and pasting it into the registration key field to see if the application crashes.'}, {'type': 'paragraph', 'content': 'The PoC steps include:'}, {'type': 'list_item', 'content': 'Download and install NetShareWatcher version 1.5.8.0.'}, {'type': 'list_item', 'content': 'Run a Python script to generate a file named "poc.txt" containing 1000 "A" characters.'}, {'type': 'list_item', 'content': 'Launch NetShareWatcher and open the registration interface.'}, {'type': 'list_item', 'content': 'Copy the contents of "poc.txt" and paste them into the registration key field.'}, {'type': 'list_item', 'content': 'Click "Ok" and observe if the application crashes, indicating the presence of the vulnerability.'}] [1, 2]
What immediate steps should I take to mitigate this vulnerability?
I don't know