CVE-2020-37028
Published: 30 January 2026
Summary
CVE-2020-37028 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability. Its CVSS base score is 8.4 (High).
Operationally, ranked at the 5.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 CM-11 (User-installed Software) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Implements memory protections such as DEP, ASLR, and stack canaries to prevent arbitrary code execution from stack-based buffer overflows triggered by malicious payloads in the output folder field.
Enforces validation of user inputs like the 'Output Folder' field to reject overly long or malformed paths that could trigger the buffer overflow.
Prohibits installation of unapproved user software such as the vulnerable Socusoft Photo to Video Converter Professional version 8.07, eliminating exposure to the CVE.
NVD Description
Socusoft Photo to Video Converter Professional 8.07 contains a local buffer overflow vulnerability in the 'Output Folder' input field that allows attackers to execute arbitrary code. Attackers can craft a malicious payload and paste it into the output folder field…
more
to trigger a stack-based buffer overflow and potentially execute shellcode.
Deeper analysisAI
CVE-2020-37028 is a stack-based buffer overflow vulnerability (CWE-120) affecting Socusoft Photo to Video Converter Professional version 8.07, specifically in the 'Output Folder' input field. Published on 2026-01-30, it carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue arises when a crafted malicious payload is pasted into the output folder field, triggering the overflow and enabling potential shellcode execution.
A local attacker can exploit this vulnerability without requiring privileges (PR:N), with low attack complexity and no additional user interaction beyond providing the malicious input. Successful exploitation allows arbitrary code execution on the target system, resulting in high impacts to confidentiality, integrity, and availability.
Advisories and related resources include a proof-of-concept exploit on Exploit-DB (https://www.exploit-db.com/exploits/48691) and a vulnerability advisory from VulnCheck (https://www.vulncheck.com/advisories/socusoft-photo-to-video-converter-professional-output-folder-buffer-overflow), alongside an archived product page (https://web.archive.org/web/20190314225058/http://www.dvd-photo-slideshow.com/photo-to-video-converter.html). No specific patches or mitigations are detailed in the provided information.
Details
- CWE(s)