Description
SpotFTP Password Recover 2.4.2 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an oversized buffer in the Name field during registration. Attackers can generate a 256-byte payload, paste it into the Name input field, and trigger a crash when submitting the registration code.
Published: 2026-04-12
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

SpotFTP Password Recover 2.4.2 contains a buffer overflow flaw in the Name field used during registration. An attacker can supply an oversized 256-byte payload, causing the application to crash and terminate service, which results in a temporary loss of availability. The weakness is a classic denominator of service breakage, classified under CWE-807 for input validation failure.

Affected Systems

The vulnerability exists exclusively in SpotFTP Password Recover version 2.4.2 distributed by NSauditor. No other SpotFTP product versions are known to be affected.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity. The exploit requires local access to the machine running the application; remote or network exposure is not a prerequisite. EPSS data is not published for this entry and the vulnerability does not appear in the CISA KEV catalog, which suggests limited exploitation has been observed. Nonetheless, any local user with sufficient privileges can repeatedly provoke crashes by registering with the oversized payload, causing service interruptions.

Generated by OpenCVE AI on April 12, 2026 at 13:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website or contact NSauditor for an updated release that addresses the buffer overflow and apply the patch as soon as it is available.
  • If a patch cannot be applied immediately, restrict local users who are not required to register from accessing the registration interface, or disconnect the application from the local network to minimize the risk of exploitation.
  • Monitor application logs for repeated crashes and consider configuring an automated restart or watchdog process to recover the service automatically when it fails.

Generated by OpenCVE AI on April 12, 2026 at 13:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Nsasoft
Nsasoft spotftp
CPEs cpe:2.3:a:nsasoft:spotftp:2.4.2:*:*:*:*:*:*:*
Vendors & Products Nsasoft
Nsasoft spotftp

Mon, 13 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Nsauditor
Nsauditor spotftp Password Recover
Vendors & Products Nsauditor
Nsauditor spotftp Password Recover

Sun, 12 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
Description SpotFTP Password Recover 2.4.2 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an oversized buffer in the Name field during registration. Attackers can generate a 256-byte payload, paste it into the Name input field, and trigger a crash when submitting the registration code.
Title SpotFTP Password Recover 2.4.2 Denial of Service via Name Field
Weaknesses CWE-807
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Nsasoft Spotftp
Nsauditor Spotftp Password Recover
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-13T15:13:03.838Z

Reserved: 2026-04-12T12:19:23.786Z

Link: CVE-2019-25711

cve-icon Vulnrichment

Updated: 2026-04-13T15:12:35.929Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-12T13:16:34.300

Modified: 2026-04-17T14:14:50.820

Link: CVE-2019-25711

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:54:08Z

Weaknesses