Cyber Posture

CVE-2020-37010

CriticalPublic PoC

Published: 29 January 2026

Published
29 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0008 23.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-37010 is a critical-severity Classic Buffer Overflow (CWE-120) vulnerability in Bearshareofficial (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, ranked at the 23.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces bounds checking and validation on the Advanced Search keywords input to prevent buffer overflows from malicious payloads.

prevent

Implements memory protections like non-executable stacks and ASLR to block arbitrary code execution from EIP overwrite exploits.

prevent

Mandates remediation of the specific buffer overflow flaw in BearShare Lite through patching, configuration, or software removal.

NVD Description

BearShare Lite 5.2.5 contains a buffer overflow vulnerability in the Advanced Search keywords input that allows attackers to execute arbitrary code. Attackers can craft a specially designed payload to overwrite the EIP register and execute shellcode by pasting malicious content…

more

into the search keywords field.

Deeper analysisAI

CVE-2020-37010 is a buffer overflow vulnerability (CWE-120) in BearShare Lite 5.2.5, specifically within the Advanced Search keywords input field. The issue arises from inadequate bounds checking, allowing attackers to craft a specially designed payload that overwrites the EIP register and executes arbitrary shellcode when malicious content is pasted into the search keywords field.

The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable remotely over the network with low attack complexity, no privileges, and no user interaction required. Attackers can achieve high impacts on confidentiality, integrity, and availability, potentially gaining full arbitrary code execution on the affected system.

Advisories and proof-of-concept exploits are available via references including Exploit-DB (exploit 48839) and VulnCheck's advisory on the BearShare Lite Advanced Search buffer overflow PoC. Additional links point to the BearShare official site and an old version download page for BearShare Lite 5.2.5, though no patches or vendor-specific mitigations are detailed in the provided information.

Details

CWE(s)

Affected Products

Bearshareofficial
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-24956Shared CWE-120
CVE-2024-57482Shared CWE-120
CVE-2024-57479Shared CWE-120
CVE-2025-69807Shared CWE-120
CVE-2019-25353Shared CWE-120
CVE-2020-37050Shared CWE-120
CVE-2020-37207Shared CWE-120
CVE-2025-50670Shared CWE-120
CVE-2024-53027Shared CWE-120
CVE-2024-57509Shared CWE-120

References