{"id":"CVE-2020-28926","details":"ReadyMedia (aka MiniDLNA) before versions 1.3.0 allows remote code execution. Sending a malicious UPnP HTTP request to the miniDLNA service using HTTP chunked encoding can lead to a signedness bug resulting in a buffer overflow in calls to memcpy/memmove.","modified":"2026-04-16T04:31:11.066114535Z","published":"2020-11-30T18:15:11.473Z","related":["openSUSE-SU-2020:2160-1","openSUSE-SU-2020:2194-1","openSUSE-SU-2020:2204-1","openSUSE-SU-2020:2226-1","openSUSE-SU-2024:11050-1"],"references":[{"type":"ADVISORY","url":"https://sourceforge.net/projects/minidlna/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4806"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html"},{"type":"EVIDENCE","url":"https://www.rootshellsecurity.net/remote-heap-corruption-bug-discovery-minidlna/"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-28926.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"1.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}