High severity8.4NVD Advisory· Published Apr 5, 2026· Updated Apr 9, 2026
CVE-2019-25681
CVE-2019-25681
Description
Xlight FTP Server 3.9.1 contains a structured exception handler (SEH) overwrite vulnerability that allows local attackers to crash the application and overwrite SEH pointers by supplying a crafted buffer string. Attackers can inject a 428-byte payload through the program execution field in virtual server configuration to trigger a buffer overflow that corrupts the SEH chain and enables potential code execution.
Affected products
1- cpe:2.3:a:xlightftpd:xlight_ftp_server:3.9.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.exploit-db.com/exploits/46458nvdExploitVDB Entry
- www.vulncheck.com/advisories/xlight-ftp-server-seh-overwrite-buffer-overflownvdThird Party Advisory
- www.xlightftpd.com/download/xlight.zipnvdProduct
- www.xlightftpd.com/index.htmnvdProduct
News mentions
0No linked articles in our index yet.