Xlight FTP Server 3.9.1 contains a structured exception handler (SEH) overwrite vulnerability that allows local attackers to crash the application and overwrite SEH pointers by supplying a crafted buffer string. Attackers can inject a 428-byte payload through the program execution field in virtual server configuration to trigger a buffer overflow that corrupts the SEH chain and enables potential code execution.

Project Subscriptions

Vendors Products
Xlightftpd Subscribe
Xlight Ftp Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description Xlight FTP Server 3.9.1 contains a structured exception handler (SEH) overwrite vulnerability that allows local attackers to crash the application and overwrite SEH pointers by supplying a crafted buffer string. Attackers can inject a 428-byte payload through the program execution field in virtual server configuration to trigger a buffer overflow that corrupts the SEH chain and enables potential code execution.
Title Xlight FTP Server 3.9.1 SEH Overwrite Buffer Overflow
First Time appeared Xlightftpd
Xlightftpd xlight Ftp
Weaknesses CWE-787
CPEs cpe:2.3:a:xlightftpd:xlight_ftp:3.9.1:*:*:*:*:*:*:*
Vendors & Products Xlightftpd
Xlightftpd xlight Ftp
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T18:24:46.806Z

Reserved: 2026-04-05T13:33:54.194Z

Link: CVE-2019-25681

cve-icon Vulnrichment

Updated: 2026-04-06T18:24:38.514Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-05T21:16:46.457

Modified: 2026-04-07T13:20:35.010

Link: CVE-2019-25681

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:48:28Z

Weaknesses