CVE-2019-25611

HIGH

MiniFtp parseconf_load_setting Buffer Overflow via Configuration

Title source: cna
STIX 2.1

Description

MiniFtp contains a buffer overflow vulnerability in the parseconf_load_setting function that allows local attackers to execute arbitrary code by supplying oversized configuration values. Attackers can craft a miniftpd.conf file with values exceeding 128 bytes to overflow stack buffers and overwrite the return address, enabling code execution with root privileges.

Exploits (1)

exploitdb WORKING POC
by strider · textlocallinux
https://www.exploit-db.com/exploits/46807

References (3)

Core 3
Core References
Exploit exploit
ExploitDB-46807
https://www.exploit-db.com/exploits/46807
Product product
Official Product Homepage
https://github.com/skyqinsc/MiniFtp
Third Party Advisory third-party-advisory
VulnCheck Advisory: MiniFtp parseconf_load_setting Buffer Overflow via Configuration
https://www.vulncheck.com/advisories/miniftp-parseconf-load-setting-buffer-overflow-via-configuration

Scores

CVSS v3 8.4
EPSS 0.0002
EPSS Percentile 5.1%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-787
Status published
Products (1)
skyqinsc/MiniFtp
Published Mar 22, 2026
Tracked Since Mar 22, 2026