CVE-2019-25681
SEH Overwrite Buffer Overflow in Xlight FTP Server
Publication date: 2026-04-05
Last updated on: 2026-04-09
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| xlightftpd | xlight_ftp_server | 3.9.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2019-25681 is a vulnerability in Xlight FTP Server version 3.9.1 involving a structured exception handler (SEH) overwrite. Local attackers can exploit this by supplying a specially crafted buffer string that causes a buffer overflow. This overflow corrupts the SEH chain by injecting a 428-byte payload through the program execution field in the virtual server configuration, potentially allowing the attacker to execute arbitrary code.
How can this vulnerability impact me? :
This vulnerability can allow local attackers to crash the Xlight FTP Server application and potentially execute arbitrary code with the privileges of the application. This can lead to unauthorized control over the affected system, data compromise, or disruption of service.