Stack Buffer Overflow in Xlight FTP Server
CVE-2023-53886

5.7MEDIUM

Key Information:

Vendor

Xlightftpd

Vendor
CVE Published:
15 December 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2023-53886?

Xlight FTP Server version 3.9.3.6 contains a stack buffer overflow vulnerability that arises within the 'Execute Program' configuration. This flaw allows attackers to exploit the application by inserting a specific number of characters (294) into the program execution settings, which can result in a denial of service condition. When triggered, the vulnerability may cause the application to crash, compromising the availability of the FTP service. It is essential for users and administrators to be aware of this vulnerability and take appropriate measures to mitigate risks.

Affected Version(s)

Xlight FTP Server 3.9.3.6

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
5.7
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Yehia Elghaly
.
CVE-2023-53886 : Stack Buffer Overflow in Xlight FTP Server