Cyber Posture

CVE-2020-37036

HighPublic PoC

Published: 30 January 2026

Published
30 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 1.2th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-37036 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Informer (inferred from references). Its CVSS base score is 8.4 (High).

Operationally, ranked at the 1.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and patching of the buffer overflow flaw in RM Downloader to eliminate the vulnerability.

prevent

Implements memory safeguards like DEP and ASLR to protect against arbitrary code execution via buffer overflows, even against egg hunter bypass techniques.

prevent

Restricts user installation of unapproved software like vulnerable RM Downloader, preventing deployment of exploitable applications.

NVD Description

RM Downloader 2.50.60 contains a local buffer overflow vulnerability in the 'Load' parameter that allows attackers to execute arbitrary code by overwriting memory. Attackers can craft a malicious payload with an egg hunter technique to bypass memory protections and execute…

more

commands like launching calc.exe.

Deeper analysisAI

CVE-2020-37036 is a local buffer overflow vulnerability (CWE-120) affecting RM Downloader version 2.50.60, specifically in the 'Load' parameter. This flaw enables attackers to overwrite memory, leading to arbitrary code execution. The vulnerability carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its high impact on confidentiality, integrity, and availability in a local attack context.

A local attacker can exploit this vulnerability with low complexity and no privileges required, without needing user interaction. By crafting a malicious payload incorporating an egg hunter technique, the attacker can bypass memory protections and execute arbitrary commands, such as launching calc.exe.

Advisories and related resources, including a VulnCheck advisory at https://www.vulncheck.com/advisories/rm-downloader-load-local-buffer-overflow, an Exploit-DB entry at https://www.exploit-db.com/exploits/48628, and a GitHub repository at https://github.com/x00x00x00x00/RMDownloader_2.50.60, document the issue and proof-of-concept exploit details. The RM Downloader software page is available at https://rm-downloader.software.informer.com/. No specific patches or mitigations are detailed in the provided information.

Details

CWE(s)

Affected Products

Informer
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-24956Shared CWE-120
CVE-2024-57482Shared CWE-120
CVE-2024-57479Shared CWE-120
CVE-2025-69807Shared CWE-120
CVE-2019-25353Shared CWE-120
CVE-2020-37050Shared CWE-120
CVE-2020-37207Shared CWE-120
CVE-2025-50670Shared CWE-120
CVE-2024-53027Shared CWE-120
CVE-2024-57509Shared CWE-120

References