Home

Description

WM Downloader version 3.1.2.2 is vulnerable to a buffer overflow when processing a specially crafted .m3u playlist file. The application fails to properly validate input length, allowing an attacker to overwrite structured exception handler (SEH) records and execute arbitrary code. Exploitation occurs locally when a user opens the malicious file, and the payload executes with the privileges of the current user.

PUBLISHED Reserved 2025-08-28 | Published 2025-08-30 | Updated 2025-09-02 | Assigner VulnCheck




HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-134 Use of Externally-Controlled Format String

Product status

Default status
unaffected

*
affected

Credits

fdiskyou finder

References

raw.githubusercontent.com/...fileformat/wm_downloader_m3u.rb exploit

www.exploit-db.com/exploits/14497 exploit

www.exploit-db.com/exploits/16642 exploit

www.fortiguard.com/...ps/24038/wm-downloader-buffer-overflow third-party-advisory

www.vulncheck.com/...-buffer-overflow-via-malformed-m3u-file third-party-advisory

cve.org (CVE-2010-10017)

nvd.nist.gov (CVE-2010-10017)

Download JSON