Core FTP 2.0 build 653 contains a denial of service vulnerability in the PBSZ command that allows unauthenticated attackers to crash the service by sending a malformed command with an oversized buffer. Attackers can send a PBSZ command with a payload exceeding 211 bytes to trigger an access violation and crash the FTP server process.
Metrics
Affected Vendors & Products
References
History
Sun, 05 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Core FTP 2.0 build 653 contains a denial of service vulnerability in the PBSZ command that allows unauthenticated attackers to crash the service by sending a malformed command with an oversized buffer. Attackers can send a PBSZ command with a payload exceeding 211 bytes to trigger an access violation and crash the FTP server process. | |
| Title | Core FTP 2.0 build 653 PBSZ Unauthenticated Denial of Service | |
| First Time appeared |
Coreftp
Coreftp core Ftp |
|
| Weaknesses | CWE-306 | |
| CPEs | cpe:2.3:a:coreftp:core_ftp:2.0:build_653:*:*:*:*:*:* | |
| Vendors & Products |
Coreftp
Coreftp core Ftp |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-05T20:45:35.338Z
Reserved: 2026-04-05T15:24:05.668Z
Link: CVE-2019-25686
No data.
Status : Received
Published: 2026-04-05T21:16:47.310
Modified: 2026-04-05T21:16:47.310
Link: CVE-2019-25686
No data.
OpenCVE Enrichment
No data.