CVE-2021-47775

8.4 HIGH

📋 TL;DR

CVE-2021-47775 is a buffer overflow vulnerability in YouTube Video Grabber (YouTube Downloader) that allows attackers to execute arbitrary code by overwriting the Structured Exception Handler. Attackers can craft a 712-byte malicious payload to trigger a bind shell connection on a specified port. Users running vulnerable versions of this software are affected.

💻 Affected Systems

Products:
  • YouTube Video Grabber
  • YouTube Downloader
Versions: 1.9.9.1 and likely earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the core application functionality and requires no special configuration to be exploitable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with remote code execution leading to attacker-controlled bind shell, data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or remote code execution if the application processes malicious input, potentially leading to system compromise.

🟢

If Mitigated

Limited impact with proper network segmentation, application whitelisting, and least privilege principles in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available on Exploit-DB (50471) demonstrating SEH overwrite leading to bind shell.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.litexmedia.com/youtube-grabber/

Restart Required: No

Instructions:

1. Uninstall YouTube Video Grabber/YouTube Downloader version 1.9.9.1 and earlier. 2. Check vendor website for updated version. 3. If no update available, remove the software completely.

🔧 Temporary Workarounds

Application Removal

windows

Completely uninstall the vulnerable software to eliminate the attack surface.

Control Panel > Programs > Uninstall a program > Select YouTube Video Grabber/YouTube Downloader > Uninstall

Network Segmentation

all

Isolate systems running vulnerable software from critical networks and internet access.

🧯 If You Can't Patch

  • Implement strict application whitelisting to prevent execution of unauthorized software.
  • Deploy endpoint detection and response (EDR) solutions with behavioral monitoring for buffer overflow attacks.

🔍 How to Verify

Check if Vulnerable:

Check installed programs list for YouTube Video Grabber or YouTube Downloader version 1.9.9.1 or earlier.

Check Version:

Check via Control Panel > Programs > Programs and Features or examine application properties.

Verify Fix Applied:

Verify the software is no longer installed or has been updated to a version later than 1.9.9.1.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs from YouTube Video Grabber/Downloader
  • Windows Event Logs showing abnormal process termination (Event ID 1000)

Network Indicators:

  • Unexpected bind shell connections on non-standard ports
  • Network traffic to/from the application with suspicious payload patterns

SIEM Query:

source="windows" AND (process_name="YouTubeGrabber.exe" OR process_name="YouTubeDownloader.exe") AND (event_id=1000 OR "access violation")

🔗 References

📤 Share & Export