Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Raimersoft
Raimersoft tapinradio |
|
| Vendors & Products |
Raimersoft
Raimersoft tapinradio |
Fri, 06 Feb 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy username configuration that allows local attackers to crash the application. Attackers can overwrite the username field with 10,000 bytes of arbitrary data to trigger an application crash and prevent normal program functionality. | |
| Title | TapinRadio 2.12.3 - 'username' Denial of Service | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-10T20:41:16.742Z
Reserved: 2026-02-06T12:31:16.221Z
Link: CVE-2020-37171
Updated: 2026-02-10T20:33:46.292Z
Status : Awaiting Analysis
Published: 2026-02-07T00:15:57.460
Modified: 2026-02-09T16:08:55.263
Link: CVE-2020-37171
No data.
OpenCVE Enrichment
Updated: 2026-02-09T10:45:17Z