WM Downloader version 3.1.2.2 is vulnerable to a buffer overflow when processing a specially crafted .m3u playlist file. The application fails to properly validate input length, allowing an attacker to overwrite structured exception handler (SEH) records and execute arbitrary code. Exploitation occurs locally when a user opens the malicious file, and the payload executes with the privileges of the current user.
Metrics
Affected Vendors & Products
References
History
Tue, 02 Sep 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 30 Aug 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WM Downloader version 3.1.2.2 is vulnerable to a buffer overflow when processing a specially crafted .m3u playlist file. The application fails to properly validate input length, allowing an attacker to overwrite structured exception handler (SEH) records and execute arbitrary code. Exploitation occurs locally when a user opens the malicious file, and the payload executes with the privileges of the current user. | |
| Title | WM Downloader 3.1.2.2 Buffer Overflow via Malformed M3U File | |
| Weaknesses | CWE-120 CWE-134 |
|
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-30T13:49:28.100Z
Updated: 2025-09-02T20:38:50.034Z
Reserved: 2025-08-28T19:04:01.479Z
Link: CVE-2010-10017
Updated: 2025-09-02T20:38:42.478Z
Status : Awaiting Analysis
Published: 2025-08-30T14:15:37.477
Modified: 2025-09-02T15:55:25.420
Link: CVE-2010-10017
No data.