Core FTP 2.0 build 653 contains a denial of service vulnerability in the PBSZ command that allows unauthenticated attackers to crash the service by sending a malformed command with an oversized buffer. Attackers can send a PBSZ command with a payload exceeding 211 bytes to trigger an access violation and crash the FTP server process.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 05 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Core FTP 2.0 build 653 contains a denial of service vulnerability in the PBSZ command that allows unauthenticated attackers to crash the service by sending a malformed command with an oversized buffer. Attackers can send a PBSZ command with a payload exceeding 211 bytes to trigger an access violation and crash the FTP server process. | |
| Title | Core FTP 2.0 build 653 PBSZ Unauthenticated Denial of Service | |
| First Time appeared |
Coreftp
Coreftp core Ftp |
|
| Weaknesses | CWE-306 | |
| CPEs | cpe:2.3:a:coreftp:core_ftp:2.0:build_653:*:*:*:*:*:* | |
| Vendors & Products |
Coreftp
Coreftp core Ftp |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-05T20:45:35.338Z
Reserved: 2026-04-05T15:24:05.668Z
Link: CVE-2019-25686
No data.
Status : Received
Published: 2026-04-05T21:16:47.310
Modified: 2026-04-05T21:16:47.310
Link: CVE-2019-25686
No data.
OpenCVE Enrichment
No data.
Weaknesses