Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 05 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Core FTP 2.0 build 653 contains a denial of service vulnerability in the PBSZ command that allows unauthenticated attackers to crash the service by sending a malformed command with an oversized buffer. Attackers can send a PBSZ command with a payload exceeding 211 bytes to trigger an access violation and crash the FTP server process. | |
| Title | Core FTP 2.0 build 653 PBSZ Unauthenticated Denial of Service | |
| First Time appeared |
Coreftp
Coreftp core Ftp |
|
| Weaknesses | CWE-306 | |
| CPEs | cpe:2.3:a:coreftp:core_ftp:2.0:build_653:*:*:*:*:*:* | |
| Vendors & Products |
Coreftp
Coreftp core Ftp |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-06T15:43:16.572Z
Reserved: 2026-04-05T15:24:05.668Z
Link: CVE-2019-25686
Updated: 2026-04-06T15:43:08.703Z
Status : Analyzed
Published: 2026-04-05T21:16:47.310
Modified: 2026-04-09T19:03:17.493
Link: CVE-2019-25686
No data.
OpenCVE Enrichment
Updated: 2026-04-06T21:48:23Z