CVE-2019-25361
Published: 18 February 2026
Description
Ayukov NFTP client 1.71 contains a buffer overflow vulnerability in the SYST command handling that allows remote attackers to execute arbitrary code. Attackers can send a specially crafted SYST command with oversized payload to trigger a buffer overflow and execute…
more
a bind shell on port 5150.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the buffer overflow vulnerability in Ayukov NFTP client 1.71 by applying patches or upgrading to a non-vulnerable version.
Validates the size and structure of incoming SYST command payloads to prevent buffer overflows from oversized inputs.
Implements memory protections like ASLR, DEP, and stack canaries to block arbitrary code execution even if the buffer overflow occurs.
Security SummaryAI
CVE-2019-25361 is a buffer overflow vulnerability in the Ayukov NFTP client version 1.71, specifically within the SYST command handling. This stack-based buffer overflow, mapped to CWE-121, allows remote attackers to execute arbitrary code by sending a specially crafted SYST command with an oversized payload. The vulnerability received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its critical severity due to high confidentiality, integrity, and availability impacts.
Remote attackers can exploit this vulnerability without authentication, privileges, or user interaction, connecting over the network to a vulnerable NFTP client instance. By transmitting a malformed SYST command, the oversized payload overflows the buffer, enabling arbitrary code execution, such as establishing a bind shell on TCP port 5150 for remote control of the affected system.
Advisories from VulnCheck detail the buffer overflow in Ayukov NFTP's SYST handling, while Exploit-DB provides a corresponding proof-of-concept exploit (ID 47576). The official Ayukov NFTP site at ayukov.com/nftp/ is referenced, though specific patch or mitigation guidance is not outlined in the available descriptions.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow in FTP client enables remote arbitrary code execution via Exploitation for Client Execution (T1203).