Cyber Posture

CVE-2019-25654

HighPublic PoC

Published: 30 March 2026

Published
30 March 2026
Modified
08 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0006 17.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2019-25654 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Coreftp Core Ftp. Its CVSS base score is 7.5 (High).

Operationally, ranked at the 17.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents buffer overflows by enforcing input validation mechanisms, such as length checks, on the User domain field to reject excessively long strings.

prevent

SI-2 requires identification, reporting, and correction of flaws like this buffer overflow vulnerability through timely patching or software replacement.

prevent

SC-5 limits the effects of denial-of-service events like service crashes from buffer overflows using mechanisms such as rate limiting or traffic shaping.

NVD Description

Core FTP/SFTP Server 1.2 contains a buffer overflow vulnerability that allows attackers to crash the service by supplying an excessively long string in the User domain field. Attackers can paste a malicious payload containing 7000 bytes of data into the…

more

domain configuration to trigger an application crash and deny service.

Deeper analysisAI

CVE-2019-25654 is a buffer overflow vulnerability (CWE-787) in Core FTP/SFTP Server version 1.2. The flaw occurs in the User domain field, where attackers can supply an excessively long string, such as a malicious payload containing 7000 bytes of data, during domain configuration. This triggers a buffer overflow that crashes the service, resulting in a denial of service. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

Unauthenticated remote attackers with network access can exploit this vulnerability with low complexity and no user interaction required. By pasting the oversized payload into the domain configuration field, they can reliably crash the FTP/SFTP server process, disrupting service availability for all connected clients and potentially requiring manual restart.

Advisories and references provide further details on the issue, including a proof-of-concept exploit at https://www.exploit-db.com/exploits/46371 and a Vulncheck advisory at https://www.vulncheck.com/advisories/core-ftp-sftp-server-denial-of-service-via-buffer-overflow. The vendor site at http://www.coreftp.com/ and an archive download at http://www.coreftp.com/server/download/archive/CoreFTPServer589.42.exe are also referenced for additional context on the affected software.

Details

CWE(s)

Affected Products

coreftp
core ftp
1.2

CVEs Like This One

CVE-2019-25686Same product: Coreftp Core Ftp
CVE-2025-20890Shared CWE-787
CVE-2019-25681Shared CWE-787
CVE-2026-23715Shared CWE-787
CVE-2025-21161Shared CWE-787
CVE-2026-21327Shared CWE-787
CVE-2025-21042Shared CWE-787
CVE-2026-3094Shared CWE-787
CVE-2026-27703Shared CWE-787
CVE-2026-31698Shared CWE-787

References