CVE-2010-20042
Xion Audio Player <1.0.126 - Buffer Overflow
Title source: llmDescription
Xion Audio Player versions prior to 1.0.126 are vulnerable to a Unicode-based stack buffer overflow triggered by opening a specially crafted .m3u playlist file. The file contains an overly long string that overwrites the Structured Exception Handler (SEH) chain, allowing an attacker to hijack execution flow and run arbitrary code.
Exploits (5)
exploitdb
WORKING POC
VERIFIED
by anT!-Tr0J4n · perldoswindows
https://www.exploit-db.com/exploits/15598
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/16653
exploitdb
WORKING POC
VERIFIED
by corelanc0d3r · pythonlocalwindows
https://www.exploit-db.com/exploits/14633
metasploit
WORKING POC
GREAT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/xion_m3u_sehbof.rb
References (7)
Scores
EPSS
0.0815
EPSS Percentile
92.0%
Classification
CWE
CWE-121
Status
draft
Timeline
Published
Aug 20, 2025
Tracked Since
Feb 18, 2026