CVE-2020-37200
Published: 11 February 2026
Summary
CVE-2020-37200 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Nsasoft Netsharewatcher. Its CVSS base score is 7.5 (High).
Operationally, ranked at the 4.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
NVD Description
NetShareWatcher 1.5.8.0 contains a buffer overflow vulnerability in the registration key input that allows attackers to crash the application by supplying oversized input. Attackers can generate a 1000-character payload and paste it into the registration key field to trigger an…
more
application crash.
Deeper analysisAI
CVE-2020-37200 is a buffer overflow vulnerability (CWE-121) affecting NetShareWatcher version 1.5.8.0, located in the registration key input field. The flaw enables attackers to crash the application by supplying oversized input, such as a 1000-character payload pasted into the field.
The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating it can be exploited remotely by unauthenticated attackers with low complexity and no user interaction. Successful exploitation results in a denial-of-service condition, causing high-impact availability disruption through application crashes without affecting confidentiality or integrity.
Advisories and proof-of-concept details are documented in references such as the Vulncheck advisory at https://www.vulncheck.com/advisories/netsharewatcher-key-denial-of-service and an Exploit-DB entry at https://www.exploit-db.com/exploits/47860, along with the vendor site at http://www.nsauditor.com/. No specific patches or mitigation steps are detailed in the provided information.
Details
- CWE(s)