Xlight FTP Server 3.9.1 contains a structured exception handler (SEH) overwrite vulnerability that allows local attackers to crash the application and overwrite SEH pointers by supplying a crafted buffer string. Attackers can inject a 428-byte payload through the program execution field in virtual server configuration to trigger a buffer overflow that corrupts the SEH chain and enables potential code execution.
Metrics
Affected Vendors & Products
References
History
Sun, 05 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Xlight FTP Server 3.9.1 contains a structured exception handler (SEH) overwrite vulnerability that allows local attackers to crash the application and overwrite SEH pointers by supplying a crafted buffer string. Attackers can inject a 428-byte payload through the program execution field in virtual server configuration to trigger a buffer overflow that corrupts the SEH chain and enables potential code execution. | |
| Title | Xlight FTP Server 3.9.1 SEH Overwrite Buffer Overflow | |
| First Time appeared |
Xlightftpd
Xlightftpd xlight Ftp |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:xlightftpd:xlight_ftp:3.9.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Xlightftpd
Xlightftpd xlight Ftp |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-05T20:45:31.303Z
Reserved: 2026-04-05T13:33:54.194Z
Link: CVE-2019-25681
No data.
Status : Received
Published: 2026-04-05T21:16:46.457
Modified: 2026-04-05T21:16:46.457
Link: CVE-2019-25681
No data.
OpenCVE Enrichment
No data.