{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2019-25611/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["critical"],"_cs_tags":["cve-2019-25611","buffer-overflow","privilege-escalation","miniftp"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eThe MiniFtp application is susceptible to a buffer overflow vulnerability, identified as CVE-2019-25611, within the \u003ccode\u003eparseconf_load_setting\u003c/code\u003e function. This flaw allows a local attacker to execute arbitrary code on the system. The vulnerability stems from insufficient bounds checking when loading configuration values from the \u003ccode\u003eminiftpd.conf\u003c/code\u003e file. By crafting a malicious configuration file with values exceeding 128 bytes, an attacker can overflow stack buffers, overwrite the return address, and…\u003c/p\u003e\n","date_modified":"2026-03-23T12:00:00Z","date_published":"2026-03-23T12:00:00Z","id":"/briefs/2026-03-miniftp-overflow/","summary":"MiniFtp contains a buffer overflow vulnerability in the parseconf_load_setting function allowing local attackers to execute arbitrary code by supplying oversized configuration values in the miniftpd.conf file.","title":"MiniFtp Buffer Overflow Vulnerability (CVE-2019-25611)","url":"https://feed.craftedsignal.io/briefs/2026-03-miniftp-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2019-25611","version":"https://jsonfeed.org/version/1.1"}