CVE-2019-25681
Received Received - Intake
SEH Overwrite Buffer Overflow in Xlight FTP Server

Publication date: 2026-04-05

Last updated on: 2026-04-09

Assigner: VulnCheck

Description
Xlight FTP Server 3.9.1 contains a structured exception handler (SEH) overwrite vulnerability that allows local attackers to crash the application and overwrite SEH pointers by supplying a crafted buffer string. Attackers can inject a 428-byte payload through the program execution field in virtual server configuration to trigger a buffer overflow that corrupts the SEH chain and enables potential code execution.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-05
Last Modified
2026-04-09
Generated
2026-05-07
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
xlightftpd xlight_ftp_server 3.9.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2019-25681 is a vulnerability in Xlight FTP Server version 3.9.1 involving a structured exception handler (SEH) overwrite. Local attackers can exploit this by supplying a specially crafted buffer string that causes a buffer overflow. This overflow corrupts the SEH chain by injecting a 428-byte payload through the program execution field in the virtual server configuration, potentially allowing the attacker to execute arbitrary code.


How can this vulnerability impact me? :

This vulnerability can allow local attackers to crash the Xlight FTP Server application and potentially execute arbitrary code with the privileges of the application. This can lead to unauthorized control over the affected system, data compromise, or disruption of service.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart