Cyber Posture

CVE-2019-25321

CriticalPublic PoC

Published: 12 February 2026

Published
12 February 2026
Modified
03 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0054 67.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

FTP Navigator 8.03 contains a stack overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload that triggers a buffer overflow when pasted into the Custom Command textbox,…

more

enabling remote code execution and launching the calculator as proof of concept.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely identification, reporting, and correction of flaws like the stack buffer overflow in CVE-2019-25321, eliminating the vulnerability through patching or removal.

prevent

Implements memory safeguards such as DEP, ASLR, and stack canaries that prevent successful SEH register overwrites and arbitrary code execution from stack overflows.

prevent

Mandates validation of information inputs like those pasted into the Custom Command textbox to block malicious payloads triggering the buffer overflow.

Security SummaryAI

CVE-2019-25321 is a stack-based buffer overflow vulnerability (CWE-121) affecting FTP Navigator version 8.03. The issue enables attackers to overwrite Structured Exception Handler (SEH) registers by crafting a malicious payload that triggers the overflow when pasted into the Custom Command textbox, resulting in arbitrary code execution.

Remote attackers can exploit this vulnerability without privileges or user interaction, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation allows full remote code execution on the target system, with a proof-of-concept demonstrating the launch of the Windows calculator.

Advisories and related resources include the vendor site at http://www.internet-soft.com/, Exploit-DB entries at https://www.exploit-db.com/exploits/47794 and https://www.exploit-db.com/exploits/47812, and a VulnCheck advisory at https://www.vulncheck.com/advisories/ftp-navigator-stack-overflow-seh. No patch or specific mitigation details are mentioned in the CVE description.

Details

CWE(s)

Affected Products

internet-soft
ftp navigator
≤ 8.03

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Stack-based buffer overflow in FTP Navigator client application enables remote arbitrary code execution, directly mapping to Exploitation for Client Execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References