Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2019-25361 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: CVE-2019-25361 is a critical buffer overflow in the **SYST command** of Ayukov NFTP v1.71. πŸ’₯ **Consequences**: Remote attackers can execute **arbitrary code** on the target system.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-121** (Stack-based Buffer Overflow). The flaw lies in how the client processes the **SYST** response from the server. Input validation is missing, allowing overflow. πŸ“‰

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: Specifically **Ayukov NFTP client version 1.71**. Developed by Sergey V. Ayukov. If you are using this specific personal tool, you are at risk. ⚠️

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Full **Remote Code Execution (RCE)**. Attackers gain **High** impact on Confidentiality, Integrity, and Availability. They can take over the machine completely. πŸ”“

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Exploitation Threshold**: **LOW**. CVSS Vector: **AV:N/AC:L/PR:N/UI:N**. No authentication needed. No user interaction required. Network-accessible. Easy to exploit. 🎯

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exploit**: **YES**. ExploitDB ID **47576** exists. VulnCheck has published an advisory. Wild exploitation is possible if the exploit is active. πŸ•ΈοΈ

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **NFTP client v1.71** usage. Check if your system connects to untrusted FTP servers. Look for the specific binary or process name 'NFTP'. 🧐

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: The vendor homepage is **ayukov.com/nftp/**. However, the CVE was published in **2026**, suggesting a long-standing issue. Check for updates there. πŸ”„

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: **Isolate** the system. Do not connect to untrusted FTP servers. Use a **firewall** to block outbound FTP connections from this client. πŸ›‘

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. CVSS 9.8 + Public Exploit + No Auth Required. Patch immediately or isolate. Do not ignore this. 🚨