TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy username configuration that allows local attackers to crash the application. Attackers can overwrite the username field with 10,000 bytes of arbitrary data to trigger an application crash and prevent normal program functionality.
History

Thu, 19 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:raimersoft:tapinradio:*:*:*:*:*:*:*:*

Tue, 17 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Raimersoft
Raimersoft tapinradio
Vendors & Products Raimersoft
Raimersoft tapinradio

Fri, 06 Feb 2026 23:30:00 +0000

Type Values Removed Values Added
Description TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy username configuration that allows local attackers to crash the application. Attackers can overwrite the username field with 10,000 bytes of arbitrary data to trigger an application crash and prevent normal program functionality.
Title TapinRadio 2.12.3 - 'username' Denial of Service
Weaknesses CWE-120
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-02-06T23:14:13.743Z

Updated: 2026-02-17T16:54:04.150Z

Reserved: 2026-02-06T12:31:16.221Z

Link: CVE-2020-37171

cve-icon Vulnrichment

Updated: 2026-02-10T20:33:46.292Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-07T00:15:57.460

Modified: 2026-02-19T19:29:30.633

Link: CVE-2020-37171

cve-icon Redhat

No data.