Impact
SpotFTP Password Recover 2.4.2 contains a buffer overflow flaw in the Name field used during registration. An attacker can supply an oversized 256-byte payload, causing the application to crash and terminate service, which results in a temporary loss of availability. The weakness is a classic denominator of service breakage, classified under CWE-807 for input validation failure.
Affected Systems
The vulnerability exists exclusively in SpotFTP Password Recover version 2.4.2 distributed by NSauditor. No other SpotFTP product versions are known to be affected.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity. The exploit requires local access to the machine running the application; remote or network exposure is not a prerequisite. EPSS data is not published for this entry and the vulnerability does not appear in the CISA KEV catalog, which suggests limited exploitation has been observed. Nonetheless, any local user with sufficient privileges can repeatedly provoke crashes by registering with the oversized payload, causing service interruptions.
OpenCVE Enrichment