CVE-2020-37208
Published: 11 February 2026
Summary
CVE-2020-37208 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Nsasoft Spotftp. Its CVSS base score is 7.5 (High).
Operationally, ranked at the 4.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Out-of-bounds writes that corrupt control flow or inject shellcode are rendered non-executable by the same memory protections.
NVD Description
SpotFTP 3.0.0.0 contains a buffer overflow vulnerability in the registration key input field that allows attackers to crash the application. Attackers can generate a 1000-character payload and paste it into the 'Key' field to trigger an application crash and denial…
more
of service.
Deeper analysisAI
CVE-2020-37208 is a buffer overflow vulnerability (CWE-787) affecting SpotFTP version 3.0.0.0 in the registration key input field. Published on 2026-02-11, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high-impact availability disruption with no confidentiality or integrity effects.
The vulnerability can be exploited by remote attackers requiring no privileges or user interaction. By generating a 1000-character payload and pasting it into the 'Key' field, attackers trigger an application crash, resulting in a denial of service.
Advisories from VulnCheck and a proof-of-concept on Exploit-DB detail the issue in SpotFTP's FTP password recovery key handling, confirming the crash via the described payload. No patches or vendor-specific mitigations are referenced.
Details
- CWE(s)