Buffer Overflow in MiniFtp Product by MiniFtp
CVE-2019-25611
Key Information:
Badges
What is CVE-2019-25611?
MiniFtp contains a buffer overflow vulnerability in the parseconf_load_setting function, which allows local attackers to execute arbitrary code. This occurs when oversized configuration values are provided, specifically exceeding 128 bytes. Attackers can craft a malicious miniftpd.conf file to overflow stack buffers and overwrite the return address, thus gaining code execution capabilities with root privileges.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
MiniFtp *
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
