Browse all 6 CVE security advisories affecting Raimersoft. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Raimersoft develops software tools primarily for IT management and system administration, focusing on remote control and desktop solutions. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and improper access controls. While no major public security incidents have been widely documented, the six CVEs associated with the company highlight recurring issues in authentication mechanisms and secure coding practices. Their software typically requires elevated privileges, increasing potential impact when vulnerabilities exist. Security researchers have noted that some implementations lack proper boundary checks, leading to exploitable conditions in network-facing components.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2019-25584 | RarmaRadio 2.72.3 Server Field Buffer Overflow Denial of Service — RarmaRadioCWE-787 | 6.2 | Medium | 2026-03-22 |
| CVE-2019-25583 | RarmaRadio 2.72.3 Username Field Denial of Service — RarmaRadioCWE-1282 | 6.2 | Medium | 2026-03-22 |
| CVE-2020-37171 | TapinRadio 2.12.3 - 'username' Denial of Service — TapinRadioCWE-120 | 6.2 | Medium | 2026-02-06 |
| CVE-2020-37170 | TapinRadio 2.12.3 - 'address' Denial of Service — TapinRadioCWE-120 | 6.2 | Medium | 2026-02-06 |
| CVE-2020-36949 | TapinRadio 2.13.7 - Denial of Service — TapinRadioCWE-770 | 7.5 | High | 2026-01-27 |
| CVE-2021-47821 | RarmaRadio 2.72.8 - Denial of Service — RarmaRadioCWE-1284 | 7.5 | High | 2026-01-16 |
This page lists every published CVE security advisory associated with Raimersoft. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.