Cyber Posture

CVE-2020-37050

CriticalPublic PoC

Published: 30 January 2026

Published
30 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 31.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Quick Player 1.3 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by crafting a malicious .m3l file with carefully constructed payload. Attackers can trigger the vulnerability by loading a specially crafted file through the application's file…

more

loading mechanism, potentially enabling remote code execution.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents buffer overflow exploitation by validating inputs from malicious .m3l files during the file loading mechanism.

prevent

Mitigates arbitrary code execution from buffer overflows through memory safeguards like ASLR and DEP.

prevent

Addresses the root cause by requiring timely flaw remediation and patching of the buffer overflow vulnerability in Quick Player.

Security SummaryAI

CVE-2020-37050 is a buffer overflow vulnerability (CWE-120) affecting Quick Player version 1.3. The flaw enables attackers to execute arbitrary code by crafting a malicious .m3l file containing a carefully constructed payload. It is triggered through the application's file loading mechanism when processing the specially crafted file, potentially leading to remote code execution. The vulnerability received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical.

Any remote attacker can exploit this vulnerability without authentication or user interaction prerequisites per the CVSS vector. By delivering the malicious .m3l file, the attacker achieves high-impact remote code execution, compromising confidentiality, integrity, and availability on the targeted system.

Advisories and references, including those from VulnCheck (https://www.vulncheck.com/advisories/quick-player-ml-buffer-overflow) and Exploit-DB (https://www.exploit-db.com/exploits/48564), detail the issue. An archived blog post by whitecr0wz (https://web.archive.org/web/20201022211753/https://whitecr0wz.github.io/posts/Exploiting-Quick-Player/) provides exploitation analysis, accompanied by imagery (https://web.archive.org/web/20210105222205/https://whitecr0wz.github.io/assets/img/Findings6/18.gif). No specific patch or mitigation steps are outlined in the provided information.

A proof-of-concept exploit is publicly available on Exploit-DB, indicating potential for practical exploitation in environments running the affected Quick Player version downloadable from sources like CNET (https://download.cnet.com/quick-player/3000-2168_4-10871417.html). The CVE was published on 2026-01-30.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The buffer overflow vulnerability in Quick Player enables arbitrary code execution via a malicious .m3l file, directly mapping to Exploitation for Client Execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References