Axessh 4.2 contains a denial of service vulnerability in the logging configuration that allows local attackers to crash the application by supplying an excessively long string in the log file name field. Attackers can enable session logging, paste a buffer of 500 or more characters into the log file name parameter, and trigger a crash when establishing a telnet connection.
History

Sun, 22 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description Axessh 4.2 contains a denial of service vulnerability in the logging configuration that allows local attackers to crash the application by supplying an excessively long string in the log file name field. Attackers can enable session logging, paste a buffer of 500 or more characters into the log file name parameter, and trigger a crash when establishing a telnet connection.
Title Axessh 4.2 Denial of Service via Log File Name
Weaknesses CWE-1282
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-22T13:38:28.762Z

Reserved: 2026-03-22T12:50:42.558Z

Link: CVE-2019-25590

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-22T14:16:24.587

Modified: 2026-03-22T14:16:24.587

Link: CVE-2019-25590

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.