Description
NICO-FTP 3.0.1.19 contains a structured exception handler buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending crafted FTP commands. Attackers can connect to the FTP service and send oversized data in response handlers to overwrite SEH pointers and redirect execution to injected shellcode.
Published: 2026-04-04
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

NICO‑FTP version 3.0.1.19 has a structured exception handler buffer overflow that allows an attacker to execute arbitrary code by sending oversized FTP command responses. By overwriting SEH pointers and redirecting execution to injected shellcode, an attacker can gain full control of the system running the vulnerable service.

Affected Systems

The vulnerability applies to NICO‑FTP, specifically to version 3.0.1.19. No other versions or components are identified as affected in the available CNA data.

Risk and Exploitability

The CVSS score of 9.3 indicates critical severity. Although EPSS data is not available and the vulnerability is not listed in KEV, the flaw remains remotely exploitable. Based on the description, the attack vector is remote access via the FTP service; an attacker can connect from anywhere on the network, send crafted payloads, and achieve arbitrary code execution.

Generated by OpenCVE AI on April 4, 2026 at 17:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update NICO‑FTP to the latest available version that contains a patch for the SEH buffer overflow.
  • If a patch is not yet available, restrict the FTP service to trusted hosts or block inbound FTP traffic from untrusted networks as a temporary measure.
  • Monitor FTP logs for unusually large command payloads and apply vendor updates as soon as they are released.

Generated by OpenCVE AI on April 4, 2026 at 17:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Nico-ftp Project
Nico-ftp Project nico-ftp
CPEs cpe:2.3:a:nico-ftp_project:nico-ftp:*:*:*:*:*:*:*:*
Vendors & Products Nico-ftp Project
Nico-ftp Project nico-ftp

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Nico-ftp
Nico-ftp nico-ftp
Vendors & Products Nico-ftp
Nico-ftp nico-ftp

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 04 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description NICO-FTP 3.0.1.19 contains a structured exception handler buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending crafted FTP commands. Attackers can connect to the FTP service and send oversized data in response handlers to overwrite SEH pointers and redirect execution to injected shellcode.
Title NICO-FTP 3.0.1.19 Buffer Overflow SEH
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Nico-ftp Nico-ftp
Nico-ftp Project Nico-ftp
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T15:28:10.769Z

Reserved: 2026-04-04T13:29:29.679Z

Link: CVE-2018-25254

cve-icon Vulnrichment

Updated: 2026-04-06T15:25:24.724Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-04T14:16:21.743

Modified: 2026-04-27T13:26:40.773

Link: CVE-2018-25254

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:33Z

Weaknesses