CVE-2020-37205
Undergoing Analysis Undergoing Analysis - In Progress
Buffer Overflow in RemShutdown 2.9.0.0 Causes DoS Crash

Publication date: 2026-02-11

Last updated on: 2026-02-20

Assigner: VulnCheck

Description
RemShutdown 2.9.0.0 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the 'Name' registration field. Attackers can generate a 1000-character buffer payload and paste it into the registration name field to trigger an application crash.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-11
Last Modified
2026-02-20
Generated
2026-05-07
AI Q&A
2026-02-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nsasoft remshutdown 2.9.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-120 The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2020-37205 is a denial of service vulnerability in RemShutdown version 2.9.0.0 caused by a buffer overflow in the 'Name' registration field."}, {'type': 'paragraph', 'content': 'An attacker can input a crafted payload of about 1000 characters into this field, which overflows the buffer and causes the application to crash.'}, {'type': 'paragraph', 'content': 'This vulnerability arises from improper handling of input length in the registration name field.'}] [1, 2]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "The primary impact of this vulnerability is a denial of service condition where the RemShutdown application crashes when processing a specially crafted input in the 'Name' registration field."}, {'type': 'paragraph', 'content': 'This crash can disrupt normal operations of the software, potentially causing downtime or interruption of services that depend on RemShutdown.'}, {'type': 'paragraph', 'content': 'The vulnerability does not affect confidentiality or integrity, only availability.'}] [2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to reproduce the denial of service condition on the RemShutdown 2.9.0.0 application. Specifically, a crafted payload of approximately 1000 characters (e.g., 1000 "A" characters) can be input into the \'Name\' registration field to see if the application crashes.'}, {'type': 'paragraph', 'content': "A practical detection method involves running a script that generates a payload file and then pasting the payload into the 'Name' field during registration to observe if the application crashes."}, {'type': 'paragraph', 'content': 'For example, a Python script can be used to create a file named "poc.txt" containing 1000 "A" characters, which can then be copied and pasted into the registration dialog\'s \'Name\' field.'}, {'type': 'paragraph', 'content': 'There are no specific network commands mentioned for detection since the attack is local and requires user interaction.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': "To mitigate this vulnerability, avoid inputting excessively long strings (around 1000 characters) into the 'Name' registration field of RemShutdown 2.9.0.0."}, {'type': 'paragraph', 'content': 'Since the vulnerability requires local user interaction, restricting access to the application and limiting who can perform registration actions can reduce risk.'}, {'type': 'paragraph', 'content': 'Check for updates or patches from the vendor (http://www.nsauditor.com/) that address this buffer overflow issue and apply them as soon as they become available.'}, {'type': 'paragraph', 'content': 'If no patch is available, consider using alternative software or running RemShutdown in a controlled environment to minimize impact.'}] [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart