CVE-2020-37181

9.8 CRITICAL

📋 TL;DR

CVE-2020-37181 is a critical stack overflow vulnerability in Torrent FLV Converter 1.51 Build 117 that allows attackers to execute arbitrary code by exploiting Structured Exception Handler (SEH) overwrite through malicious registration codes. This affects users running the vulnerable software on 32-bit Windows systems. Successful exploitation gives attackers full control of the affected system.

💻 Affected Systems

Products:
  • Torrent FLV Converter
Versions: 1.51 Build 117
Operating Systems: Windows 32-bit
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects 32-bit Windows installations. The vulnerability is triggered when processing registration codes.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or malware installation when users process malicious registration codes, potentially leading to credential theft or lateral movement.

🟢

If Mitigated

Limited impact if software is isolated, not processing untrusted inputs, or running with minimal privileges.

🌐 Internet-Facing: LOW - The vulnerability requires local access or user interaction with malicious registration codes, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Risk exists if users within the organization process untrusted registration codes or if the software is deployed widely.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires crafting specific registration code payloads with SEH overwrite techniques. Public exploit code exists on Exploit-DB.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

1. Uninstall Torrent FLV Converter 1.51 Build 117 completely. 2. Use alternative video conversion software from reputable vendors. 3. Ensure no residual files remain in Program Files and AppData directories.

🔧 Temporary Workarounds

Remove software

windows

Completely uninstall the vulnerable software to eliminate the attack surface

Control Panel > Programs > Uninstall Torrent FLV Converter

Restrict execution

windows

Use application control policies to prevent execution of the vulnerable software

Using Windows AppLocker or similar to block torrentflvconverter.exe

🧯 If You Can't Patch

  • Run software in isolated virtual machine with no network access
  • Implement strict user privilege restrictions and monitor for suspicious registration code inputs

🔍 How to Verify

Check if Vulnerable:

Check installed programs for 'Torrent FLV Converter' version 1.51 Build 117 in Control Panel > Programs > Programs and Features

Check Version:

wmic product where name="Torrent FLV Converter" get version

Verify Fix Applied:

Confirm software is completely removed and torrentflvconverter.exe is not present in system

📡 Detection & Monitoring

Log Indicators:

  • Process creation events for torrentflvconverter.exe
  • Application crash logs with exception handling errors
  • Unusual registration code validation attempts

Network Indicators:

  • No direct network indicators as exploit is local

SIEM Query:

ProcessName="torrentflvconverter.exe" AND (EventID=1000 OR EventID=1001) | where CommandLine contains "registration"

🔗 References

📤 Share & Export