CloudMe 1.11.2 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code through crafted network packets. Attackers can exploit the vulnerability by sending a specially crafted payload to the CloudMe service running on port 8888, enabling remote code execution.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cloudme
Cloudme cloudme |
|
| Vendors & Products |
Cloudme
Cloudme cloudme |
Tue, 03 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CloudMe 1.11.2 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code through crafted network packets. Attackers can exploit the vulnerability by sending a specially crafted payload to the CloudMe service running on port 8888, enabling remote code execution. | |
| Title | CloudMe 1.11.2 - Buffer Overflow (SEH,DEP,ASLR) | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-03T22:01:39.604Z
Reserved: 2026-02-01T13:16:06.484Z
Link: CVE-2020-37070
No data.
Status : Received
Published: 2026-02-03T22:16:22.137
Modified: 2026-02-03T22:16:22.137
Link: CVE-2020-37070
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:05:37Z
Weaknesses