Cyber Posture

CVE-2020-37050

CriticalPublic PoC

Published: 30 January 2026

Published
30 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 31.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-37050 is a critical-severity Classic Buffer Overflow (CWE-120) vulnerability in Cnet (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 31.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents buffer overflow exploitation by validating inputs from malicious .m3l files during the file loading mechanism.

prevent

Mitigates arbitrary code execution from buffer overflows through memory safeguards like ASLR and DEP.

prevent

Addresses the root cause by requiring timely flaw remediation and patching of the buffer overflow vulnerability in Quick Player.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The buffer overflow vulnerability in Quick Player enables arbitrary code execution via a malicious .m3l file, directly mapping to Exploitation for Client Execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Quick Player 1.3 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by crafting a malicious .m3l file with carefully constructed payload. Attackers can trigger the vulnerability by loading a specially crafted file through the application's file…

more

loading mechanism, potentially enabling remote code execution.

Deeper analysisAI

CVE-2020-37050 is a buffer overflow vulnerability (CWE-120) affecting Quick Player version 1.3. The flaw enables attackers to execute arbitrary code by crafting a malicious .m3l file containing a carefully constructed payload. It is triggered through the application's file loading mechanism when processing the specially crafted file, potentially leading to remote code execution. The vulnerability received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical.

Any remote attacker can exploit this vulnerability without authentication or user interaction prerequisites per the CVSS vector. By delivering the malicious .m3l file, the attacker achieves high-impact remote code execution, compromising confidentiality, integrity, and availability on the targeted system.

Advisories and references, including those from VulnCheck (https://www.vulncheck.com/advisories/quick-player-ml-buffer-overflow) and Exploit-DB (https://www.exploit-db.com/exploits/48564), detail the issue. An archived blog post by whitecr0wz (https://web.archive.org/web/20201022211753/https://whitecr0wz.github.io/posts/Exploiting-Quick-Player/) provides exploitation analysis, accompanied by imagery (https://web.archive.org/web/20210105222205/https://whitecr0wz.github.io/assets/img/Findings6/18.gif). No specific patch or mitigation steps are outlined in the provided information.

A proof-of-concept exploit is publicly available on Exploit-DB, indicating potential for practical exploitation in environments running the affected Quick Player version downloadable from sources like CNET (https://download.cnet.com/quick-player/3000-2168_4-10871417.html). The CVE was published on 2026-01-30.

Details

CWE(s)

Affected Products

Cnet
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2020-37075Shared CWE-120
CVE-2020-37042Shared CWE-120
CVE-2025-27832Shared CWE-120
CVE-2020-37028Shared CWE-120
CVE-2019-25232Shared CWE-120
CVE-2025-0725Shared CWE-120
CVE-2020-37024Shared CWE-120
CVE-2025-25723Shared CWE-120
CVE-2020-37010Shared CWE-120
CVE-2025-66287Shared CWE-120

References