FTP Shell Server 6.83 contains a buffer overflow vulnerability in the 'Account name to ban' field that allows local attackers to execute arbitrary code by supplying a crafted string. Attackers can inject shellcode through the account name parameter in the Manage FTP Accounts dialog to overwrite the return address and execute calc.exe or other commands.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ftpshell
Ftpshell ftpshell Server |
|
| Vendors & Products |
Ftpshell
Ftpshell ftpshell Server |
Sun, 22 Mar 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FTP Shell Server 6.83 contains a buffer overflow vulnerability in the 'Account name to ban' field that allows local attackers to execute arbitrary code by supplying a crafted string. Attackers can inject shellcode through the account name parameter in the Manage FTP Accounts dialog to overwrite the return address and execute calc.exe or other commands. | |
| Title | FTP Shell Server 6.83 Buffer Overflow via Account Name | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-22T13:38:50.375Z
Reserved: 2026-03-22T13:34:07.967Z
Link: CVE-2019-25619
No data.
Status : Received
Published: 2026-03-22T14:16:30.873
Modified: 2026-03-22T14:16:30.873
Link: CVE-2019-25619
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:46:02Z
Weaknesses