CVE-2020-37036
Published: 30 January 2026
Summary
CVE-2020-37036 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Informer (inferred from references). Its CVSS base score is 8.4 (High).
Operationally, ranked at the 1.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and patching of the buffer overflow flaw in RM Downloader to eliminate the vulnerability.
Implements memory safeguards like DEP and ASLR to protect against arbitrary code execution via buffer overflows, even against egg hunter bypass techniques.
Restricts user installation of unapproved software like vulnerable RM Downloader, preventing deployment of exploitable applications.
NVD Description
RM Downloader 2.50.60 contains a local buffer overflow vulnerability in the 'Load' parameter that allows attackers to execute arbitrary code by overwriting memory. Attackers can craft a malicious payload with an egg hunter technique to bypass memory protections and execute…
more
commands like launching calc.exe.
Deeper analysisAI
CVE-2020-37036 is a local buffer overflow vulnerability (CWE-120) affecting RM Downloader version 2.50.60, specifically in the 'Load' parameter. This flaw enables attackers to overwrite memory, leading to arbitrary code execution. The vulnerability carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its high impact on confidentiality, integrity, and availability in a local attack context.
A local attacker can exploit this vulnerability with low complexity and no privileges required, without needing user interaction. By crafting a malicious payload incorporating an egg hunter technique, the attacker can bypass memory protections and execute arbitrary commands, such as launching calc.exe.
Advisories and related resources, including a VulnCheck advisory at https://www.vulncheck.com/advisories/rm-downloader-load-local-buffer-overflow, an Exploit-DB entry at https://www.exploit-db.com/exploits/48628, and a GitHub repository at https://github.com/x00x00x00x00/RMDownloader_2.50.60, document the issue and proof-of-concept exploit details. The RM Downloader software page is available at https://rm-downloader.software.informer.com/. No specific patches or mitigations are detailed in the provided information.
Details
- CWE(s)