CVE-2020-37181
Published: 11 February 2026
Summary
CVE-2020-37181 is a critical-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Torrentrockyou (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, ranked at the 22.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 CM-10 (Software Usage Restrictions) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely identification, reporting, and remediation of flaws like the stack overflow in Torrent FLV Converter, including patching if available or removal otherwise.
Authorizes and restricts software usage to approved applications only, preventing execution of vulnerable third-party software such as Torrent FLV Converter.
Implements memory safeguards like DEP and ASLR that directly mitigate stack overflow exploits involving SEH overwrites on 32-bit Windows systems.
NVD Description
Torrent FLV Converter 1.51 Build 117 contains a stack overflow vulnerability that allows attackers to overwrite Structured Exception Handler (SEH) through a malicious registration code input. Attackers can craft a payload with specific offsets and partial SEH overwrite techniques to…
more
potentially execute arbitrary code on vulnerable Windows 32-bit systems.
Deeper analysisAI
CVE-2020-37181 is a stack overflow vulnerability in Torrent FLV Converter version 1.51 Build 117. The issue arises from a malicious registration code input that enables attackers to overwrite the Structured Exception Handler (SEH) using specific offsets and partial SEH overwrite techniques. It affects vulnerable 32-bit Windows systems and is classified under CWE-121 with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Remote attackers can exploit this vulnerability over the network without requiring user privileges or interaction. By crafting a suitable payload, they can achieve arbitrary code execution on the target system, compromising confidentiality, integrity, and availability to a high degree.
Advisories and references include a proof-of-concept exploit on Exploit-DB (https://www.exploit-db.com/exploits/47938) and a detailed advisory from Vulncheck (https://www.vulncheck.com/advisories/torrent-flv-converter-build-stack-oveflow-seh-partial-overwrite). No vendor patches or specific mitigation steps are detailed in the provided information.
Details
- CWE(s)