CVE-2019-25611
HIGHMiniFtp parseconf_load_setting Buffer Overflow via Configuration
Title source: cnaDescription
MiniFtp contains a buffer overflow vulnerability in the parseconf_load_setting function that allows local attackers to execute arbitrary code by supplying oversized configuration values. Attackers can craft a miniftpd.conf file with values exceeding 128 bytes to overflow stack buffers and overwrite the return address, enabling code execution with root privileges.
Exploits (1)
References (3)
Core 3
Core References
Third Party Advisory third-party-advisory
VulnCheck Advisory: MiniFtp parseconf_load_setting Buffer Overflow via Configuration
https://www.vulncheck.com/advisories/miniftp-parseconf-load-setting-buffer-overflow-via-configuration
Scores
CVSS v3
8.4
EPSS
0.0002
EPSS Percentile
5.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-787
Status
published
Products (1)
skyqinsc/MiniFtp
Published
Mar 22, 2026
Tracked Since
Mar 22, 2026