Tabs Mail Carrier 2.5.1 contains a buffer overflow vulnerability in the MAIL FROM SMTP command that allows remote attackers to execute arbitrary code by sending a crafted MAIL FROM parameter. Attackers can connect to the SMTP service on port 25 and send a malicious MAIL FROM command with an oversized buffer to overwrite the EIP register and execute a bind shell payload.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/46547 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/tabs-mail-carrier-buffer-overflow-via-mail-from | Third Party Advisory |
Configurations
History
25 Mar 2026, 21:44
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:tabslab:mailcarrier:2.5.1:*:*:*:*:*:*:* | |
| References | () https://www.exploit-db.com/exploits/46547 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/tabs-mail-carrier-buffer-overflow-via-mail-from - Third Party Advisory | |
| First Time |
Tabslab
Tabslab mailcarrier |
24 Mar 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-24 12:16
Updated : 2026-03-25 21:44
NVD link : CVE-2019-25646
Mitre link : CVE-2019-25646
CVE.ORG link : CVE-2019-25646
JSON object : View
Products Affected
tabslab
- mailcarrier
CWE
CWE-787
Out-of-bounds Write
