Impact
NICO‑FTP version 3.0.1.19 has a structured exception handler buffer overflow that allows an attacker to execute arbitrary code by sending oversized FTP command responses. By overwriting SEH pointers and redirecting execution to injected shellcode, an attacker can gain full control of the system running the vulnerable service.
Affected Systems
The vulnerability applies to NICO‑FTP, specifically to version 3.0.1.19. No other versions or components are identified as affected in the available CNA data.
Risk and Exploitability
The CVSS score of 9.3 indicates critical severity. Although EPSS data is not available and the vulnerability is not listed in KEV, the flaw remains remotely exploitable. Based on the description, the attack vector is remote access via the FTP service; an attacker can connect from anywhere on the network, send crafted payloads, and achieve arbitrary code execution.
OpenCVE Enrichment