CVE-2019-25686
Received Received - Intake
Buffer Overflow in Core FTP PBSZ Command Causes DoS Crash

Publication date: 2026-04-05

Last updated on: 2026-04-09

Assigner: VulnCheck

Description
Core FTP 2.0 build 653 contains a denial of service vulnerability in the PBSZ command that allows unauthenticated attackers to crash the service by sending a malformed command with an oversized buffer. Attackers can send a PBSZ command with a payload exceeding 211 bytes to trigger an access violation and crash the FTP server process.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-05
Last Modified
2026-04-09
Generated
2026-05-06
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
coreftp core_ftp 2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Core FTP 2.0 build 653 and involves the PBSZ command. An unauthenticated attacker can send a malformed PBSZ command with an oversized buffer exceeding 211 bytes. This causes an access violation that crashes the FTP server process, resulting in a denial of service.


How can this vulnerability impact me? :

The impact of this vulnerability is a denial of service condition. An attacker can crash the FTP server by sending a specially crafted PBSZ command, causing the service to become unavailable. This can disrupt normal operations and prevent legitimate users from accessing the FTP service.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart