CVE-2019-25646

Tabs Mail Carrier 2.5.1 contains a buffer overflow vulnerability in the MAIL FROM SMTP command that allows remote attackers to execute arbitrary code by sending a crafted MAIL FROM parameter. Attackers can connect to the SMTP service on port 25 and send a malicious MAIL FROM command with an oversized buffer to overwrite the EIP register and execute a bind shell payload.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:tabslab:mailcarrier:2.5.1:*:*:*:*:*:*:*

History

25 Mar 2026, 21:44

Type Values Removed Values Added
CPE cpe:2.3:a:tabslab:mailcarrier:2.5.1:*:*:*:*:*:*:*
References () https://www.exploit-db.com/exploits/46547 - () https://www.exploit-db.com/exploits/46547 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/tabs-mail-carrier-buffer-overflow-via-mail-from - () https://www.vulncheck.com/advisories/tabs-mail-carrier-buffer-overflow-via-mail-from - Third Party Advisory
First Time Tabslab
Tabslab mailcarrier

24 Mar 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-24 12:16

Updated : 2026-03-25 21:44


NVD link : CVE-2019-25646

Mitre link : CVE-2019-25646

CVE.ORG link : CVE-2019-25646


JSON object : View

Products Affected

tabslab

  • mailcarrier
CWE
CWE-787

Out-of-bounds Write