CVE-2019-25607
Received Received - Intake
Stack-Based Buffer Overflow in Axessh 4.2 Enables Code Execution

Publication date: 2026-03-22

Last updated on: 2026-03-22

Assigner: VulnCheck

Description
Axessh 4.2 contains a stack-based buffer overflow vulnerability in the log file name field that allows local attackers to execute arbitrary code by supplying an excessively long filename. Attackers can overflow the buffer at offset 214 bytes to overwrite the instruction pointer and execute shellcode with system privileges.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-22
Last Modified
2026-03-22
Generated
2026-05-07
AI Q&A
2026-03-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
axessh axessh 4.2
labf axessh to 4.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2019-25607 is a local stack-based buffer overflow vulnerability in Axessh version 4.2. It occurs in the log file name field, where supplying an excessively long filename causes a buffer overflow at an offset of 214 bytes. This overflow allows a local attacker to overwrite the instruction pointer and execute arbitrary shellcode with system-level privileges.

The vulnerability is classified under CWE-787 (Out-of-bounds Write) and has a high severity score (CVSS v4 base score of 8.6). Exploiting this flaw enables attackers to gain elevated code execution capabilities on affected systems.


How can this vulnerability impact me? :

This vulnerability allows a local attacker to execute arbitrary code with system privileges by overflowing a buffer in the log file name field. As a result, an attacker can gain full control over the affected system, potentially installing malware, stealing sensitive data, or disrupting system operations.

The exploit can lead to a complete compromise of confidentiality, integrity, and availability of the system, as attackers can run shellcode that may spawn persistent remote shells or execute malicious payloads.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability is a local stack-based buffer overflow in Axessh 4.2 triggered by supplying an excessively long filename in the log file name field. Detection involves checking if the application is vulnerable by attempting to reproduce the overflow condition locally.'}, {'type': 'paragraph', 'content': "One practical detection method is to input a long string (e.g., 500 characters) into the 'Log file name' field in the application's logging settings and observe if the application crashes or behaves abnormally, indicating a buffer overflow."}, {'type': 'paragraph', 'content': 'Commands or steps to detect the vulnerability include:'}, {'type': 'list_item', 'content': 'Create a payload of 500 \'A\' characters (e.g., using Python: `python -c "print(\'\\x41\' * 500)" > Axess.txt`).'}, {'type': 'list_item', 'content': 'Copy the contents of the payload file to the clipboard.'}, {'type': 'list_item', 'content': 'Launch Axessh.exe on a Windows 7 SP1 x86 system.'}, {'type': 'list_item', 'content': "Navigate to 'Telnet Connect Host' -> 'Details>>' -> 'Settings' -> 'Logging' tab."}, {'type': 'list_item', 'content': "Enable 'Log all sessions output' and paste the long string into the 'Log file name' field."}, {'type': 'list_item', 'content': 'Confirm and attempt to connect; if the application crashes, the vulnerability is present.'}] [4]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'Immediate mitigation steps include preventing local attackers from supplying excessively long filenames in the log file name field of Axessh 4.2.'}, {'type': 'paragraph', 'content': 'Since the vulnerability requires local access, restricting user permissions and limiting access to the affected system can reduce risk.'}, {'type': 'paragraph', 'content': 'Additional steps include:'}, {'type': 'list_item', 'content': 'Avoid using Axessh version 4.2 or earlier; upgrade to a version where this vulnerability is patched if available.'}, {'type': 'list_item', 'content': "Restrict or monitor changes to logging configuration, especially the 'Log file name' field."}, {'type': 'list_item', 'content': 'Implement application whitelisting and endpoint protection to detect or block exploitation attempts.'}, {'type': 'list_item', 'content': 'If upgrading is not immediately possible, consider disabling or limiting logging features that accept user-supplied filenames.'}] [1, 4]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart