Cyberoam Authentication Client 2.1.2.7 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) memory. Attackers can craft a malicious input in the 'Cyberoam Server Address' field to trigger a bind TCP shell on port 1337 with system-level access.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Feb 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cyberoam Authentication Client 2.1.2.7 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) memory. Attackers can craft a malicious input in the 'Cyberoam Server Address' field to trigger a bind TCP shell on port 1337 with system-level access. | |
| Title | Cyberoam Authentication Client 2.1.2.7 - Buffer Overflow (SEH) | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-06T23:14:04.889Z
Reserved: 2026-02-01T13:16:06.487Z
Link: CVE-2020-37095
No data.
Status : Received
Published: 2026-02-07T00:15:53.910
Modified: 2026-02-07T00:15:53.910
Link: CVE-2020-37095
No data.
OpenCVE Enrichment
No data.