CVE-2020-37050
Severity CVSS v4.0:
HIGH
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
30/01/2026
Last modified:
30/01/2026
Description
Quick Player 1.3 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by crafting a malicious .m3l file with carefully constructed payload. Attackers can trigger the vulnerability by loading a specially crafted file through the application's file loading mechanism, potentially enabling remote code execution.
Impact
Base Score 4.0
8.40
Severity 4.0
HIGH
Base Score 3.x
9.80
Severity 3.x
CRITICAL
References to Advisories, Solutions, and Tools
- https://download.cnet.com/quick-player/3000-2168_4-10871417.html
- https://web.archive.org/web/20201022211753/https://whitecr0wz.github.io/posts/Exploiting-Quick-Player/
- https://web.archive.org/web/20210105222205/https://whitecr0wz.github.io/assets/img/Findings6/18.gif
- https://www.exploit-db.com/exploits/48564
- https://www.vulncheck.com/advisories/quick-player-ml-buffer-overflow



