Description
Xlight FTP Server 3.9.1 contains a structured exception handler (SEH) overwrite vulnerability that allows local attackers to crash the application and overwrite SEH pointers by supplying a crafted buffer string. Attackers can inject a 428-byte payload through the program execution field in virtual server configuration to trigger a buffer overflow that corrupts the SEH chain and enables potential code execution.
Published: 2026-04-05
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Local code execution via SEH overwrite
Action: Patch immediately
AI Analysis

Impact

The Xlight FTP Server 3.9.1 contains a structured exception handler overwrite due to a buffer overflow in the program execution field of the virtual server configuration. An attacker with local access can craft a 428‑byte payload that corrupts the SEH chain, potentially allowing arbitrary code execution within the FTP server process. The weakness corresponds to an out‑of‑bounds write (CWE‑787).

Affected Systems

This vulnerability affects Xlight FTP Server version 3.9.1, distributed by Xlightftpd. No other versions are indicated as vulnerable.

Risk and Exploitability

The CVSS score of 8.6 denotes high severity; however, the EPSS score is below 1%, implying a low likelihood of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog. It requires local access and the ability to edit virtual server configuration files, so the threat is primarily local. Successful exploitation would grant the attacker control over the server process.

Generated by OpenCVE AI on April 9, 2026 at 21:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Xlight FTP Server to the latest released version or apply any vendor-provided patch.
  • If an update is unavailable, remove or disable the virtual server configuration feature that uses the program execution field, or restrict write permissions on configuration files to authorized users only.
  • Monitor system logs for unexpected SEH overflows or crashes, and enforce strict internal access controls to prevent unauthorized configuration changes.

Generated by OpenCVE AI on April 9, 2026 at 21:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Xlightftpd xlight Ftp Server
CPEs cpe:2.3:a:xlightftpd:xlight_ftp_server:3.9.1:*:*:*:*:*:*:*
Vendors & Products Xlightftpd xlight Ftp Server

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description Xlight FTP Server 3.9.1 contains a structured exception handler (SEH) overwrite vulnerability that allows local attackers to crash the application and overwrite SEH pointers by supplying a crafted buffer string. Attackers can inject a 428-byte payload through the program execution field in virtual server configuration to trigger a buffer overflow that corrupts the SEH chain and enables potential code execution.
Title Xlight FTP Server 3.9.1 SEH Overwrite Buffer Overflow
First Time appeared Xlightftpd
Xlightftpd xlight Ftp
Weaknesses CWE-787
CPEs cpe:2.3:a:xlightftpd:xlight_ftp:3.9.1:*:*:*:*:*:*:*
Vendors & Products Xlightftpd
Xlightftpd xlight Ftp
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Xlightftpd Xlight Ftp Xlight Ftp Server
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T18:24:46.806Z

Reserved: 2026-04-05T13:33:54.194Z

Link: CVE-2019-25681

cve-icon Vulnrichment

Updated: 2026-04-06T18:24:38.514Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-05T21:16:46.457

Modified: 2026-04-09T19:33:14.990

Link: CVE-2019-25681

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:45:22Z

Weaknesses