Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sharing-file
Sharing-file easy File Sharing Web Server |
|
| Vendors & Products |
Sharing-file
Sharing-file easy File Sharing Web Server |
Wed, 11 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Easy File Sharing Web Server 7.2 contains a local structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by creating a malicious username. Attackers can craft a username with a payload containing 4059 bytes of padding followed by a nseh value and seh pointer to trigger the overflow when adding a new user account. | |
| Title | Easy File Sharing Web Server 7.2 Local SEH Overflow | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:04:25.412Z
Reserved: 2026-02-22T14:04:06.351Z
Link: CVE-2019-25466
Updated: 2026-03-11T19:23:07.635Z
Status : Deferred
Published: 2026-03-11T19:15:59.833
Modified: 2026-04-15T14:56:45.970
Link: CVE-2019-25466
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:29:52Z