CVE-2010-10017
Severity CVSS v4.0:
HIGH
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
30/08/2025
Last modified:
02/09/2025
Description
WM Downloader version 3.1.2.2 is vulnerable to a buffer overflow when processing a specially crafted .m3u playlist file. The application fails to properly validate input length, allowing an attacker to overwrite structured exception handler (SEH) records and execute arbitrary code. Exploitation occurs locally when a user opens the malicious file, and the payload executes with the privileges of the current user.
Impact
Base Score 4.0
8.40
Severity 4.0
HIGH
References to Advisories, Solutions, and Tools
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/wm_downloader_m3u.rb
- https://www.exploit-db.com/exploits/14497
- https://www.exploit-db.com/exploits/16642
- https://www.fortiguard.com/encyclopedia/ips/24038/wm-downloader-buffer-overflow
- https://www.vulncheck.com/advisories/wm-downloader-buffer-overflow-via-malformed-m3u-file



