Home

Description

Audio Playback Recorder 3.2.2 contains a local buffer overflow vulnerability in the eject and registration parameters that allows attackers to execute arbitrary code. Attackers can craft malicious payloads and overwrite Structured Exception Handler (SEH) to execute shellcode when pasting specially crafted input into the application's input fields.

PUBLISHED Reserved 2026-01-28 | Published 2026-01-29 | Updated 2026-01-29 | Assigner VulnCheck




NONE: 0.0CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.4CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Stack-based Buffer Overflow

Product status

3.2.2
affected

Credits

Felipe Winsnes finder

References

www.exploit-db.com/exploits/48796 exploit

www.exploit-db.com/exploits/48796 (ExploitDB-48796) exploit

web.archive.org/...hub.io/assets/img/Findings11/11-proof.gif (Archived Researcher Proof of Concept Video) exploit

archive.org/details/tucows_288670_Audio_Playback_Recorder (Product Software Archive) product

www.vulncheck.com/...back-recorder-local-buffer-overflow-seh (VulnCheck Advisory: Audio Playback Recorder 3.2.2 - Local Buffer Overflow (SEH)) third-party-advisory

cve.org (CVE-2020-37013)

nvd.nist.gov (CVE-2020-37013)

Download JSON