CVE-2019-25611
Received Received - Intake
Buffer Overflow in MiniFtp parseconf_load_setting Enables Root Code Execution

Publication date: 2026-03-22

Last updated on: 2026-03-22

Assigner: VulnCheck

Description
MiniFtp contains a buffer overflow vulnerability in the parseconf_load_setting function that allows local attackers to execute arbitrary code by supplying oversized configuration values. Attackers can craft a miniftpd.conf file with values exceeding 128 bytes to overflow stack buffers and overwrite the return address, enabling code execution with root privileges.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-22
Last Modified
2026-03-22
Generated
2026-05-07
AI Q&A
2026-03-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
skyqinsc miniftp *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2019-25611 is a buffer overflow vulnerability in the MiniFtp software, specifically in the parseconf_load_setting function. This function processes configuration settings by splitting an input string into two fixed-size buffers of 128 bytes each without proper bounds checking. If an attacker supplies configuration values exceeding 128 bytes, it causes a stack buffer overflow.

This overflow allows local attackers to overwrite the return address on the stack, enabling them to execute arbitrary code with root privileges by crafting a malicious miniftpd.conf file containing an overly long configuration line.


How can this vulnerability impact me? :

This vulnerability allows a local attacker to escalate privileges by executing arbitrary code with root privileges on the affected system. By exploiting the buffer overflow in the configuration parser, an attacker can gain full control over the system running MiniFtp.

  • Local privilege escalation
  • Execution of arbitrary code with root privileges
  • Potential full system compromise

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking the contents of the miniftpd.conf configuration file for any oversized configuration values, specifically lines where the value part exceeds 128 bytes.'}, {'type': 'paragraph', 'content': 'A practical detection method is to search for configuration lines with values longer than 128 characters, which could indicate an attempt to exploit the buffer overflow.'}, {'type': 'list_item', 'content': 'Use commands like `grep` and `awk` to find suspiciously long configuration values in miniftpd.conf, for example:'}, {'type': 'list_item', 'content': "`awk -F '=' '{ if(length($2) > 128) print $0 }' /path/to/miniftpd.conf`"}, {'type': 'list_item', 'content': 'Or use `grep` with a regex to find lines with long values:'}, {'type': 'list_item', 'content': "`grep -E '.{129,}' /path/to/miniftpd.conf`"}, {'type': 'paragraph', 'content': 'Additionally, monitoring for unexpected root shell executions or unusual process behavior related to MiniFtp could help detect exploitation attempts.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Review and sanitize the miniftpd.conf configuration file to ensure no configuration values exceed 128 bytes.
  • Restrict local access to the MiniFtp service to trusted users only, as the vulnerability requires local attacker access.
  • If possible, apply patches or updates from the MiniFtp project that address this buffer overflow vulnerability.
  • Monitor system logs and MiniFtp activity for signs of exploitation attempts.

As a longer-term solution, consider replacing MiniFtp with a more secure FTP server that does not have this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart