Cyber Posture

CVE-2020-37000

CriticalPublic PoC

Published: 29 January 2026

Published
29 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0015 35.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-37000 is a critical-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Cleanersoft (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 35.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely patching or removal of the stack buffer overflow flaw in Free MP3 CD Ripper to eliminate the vulnerability.

prevent

Implements memory safeguards like ASLR, DEP, and stack canaries that directly mitigate exploitation of the stack buffer overflow for remote code execution.

prevent

Enforces validation of WAV file inputs to reject oversized payloads that trigger the buffer overflow vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Stack buffer overflow vulnerability in Free MP3 CD Ripper enables remote code execution via a malicious WAV file processed by the client application, directly mapping to Exploitation for Client Execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Free MP3 CD Ripper 2.8 contains a stack buffer overflow vulnerability that allows remote attackers to execute arbitrary code by crafting a malicious WAV file with oversized payload. Attackers can leverage a specially crafted exploit file with shellcode, SEH bypass,…

more

and egghunter technique to achieve remote code execution on vulnerable Windows systems.

Deeper analysisAI

CVE-2020-37000 is a stack buffer overflow vulnerability (CWE-121) affecting Free MP3 CD Ripper version 2.8 on Windows systems. The flaw occurs when processing WAV files with oversized payloads, enabling remote attackers to execute arbitrary code. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and high impact on confidentiality, integrity, and availability.

Remote, unauthenticated attackers can exploit the vulnerability by delivering a specially crafted malicious WAV file. Successful exploitation leverages shellcode, SEH bypass, and egghunter techniques to achieve remote code execution on vulnerable systems, requiring no user interaction or privileges.

Advisories and exploit details are documented in references including the vendor site at https://www.cleanersoft.com, a proof-of-concept exploit at https://www.exploit-db.com/exploits/48696, and a VulnCheck advisory at https://www.vulncheck.com/advisories/free-mp-cd-ripper-stack-buffer-overflow-seh-egghunter. No specific patch or mitigation steps are detailed in the provided information.

Details

CWE(s)

Affected Products

Cleanersoft
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2024-34579Shared CWE-121
CVE-2026-43661Shared CWE-121
CVE-2019-25332Shared CWE-121
CVE-2020-37176Shared CWE-121
CVE-2025-54480Shared CWE-121
CVE-2019-25321Shared CWE-121
CVE-2020-36967Shared CWE-121
CVE-2020-37001Shared CWE-121
CVE-2019-25360Shared CWE-121
CVE-2019-25365Shared CWE-121

References