Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length checking to overwrite memory and cause a segmentation fault, resulting in program termination.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Feb 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length checking to overwrite memory and cause a segmentation fault, resulting in program termination. | |
| Title | Redir 3.3 - Denial of Service | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-11T20:37:05.294Z
Reserved: 2026-02-10T18:34:08.319Z
Link: CVE-2020-37182
No data.
Status : Received
Published: 2026-02-11T21:16:11.677
Modified: 2026-02-11T21:16:11.677
Link: CVE-2020-37182
No data.
OpenCVE Enrichment
No data.