Cobian Reflector 0.9.93 RC1 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the password input field. Attackers can paste a large 8000-byte buffer into the password field to trigger an application crash during SFTP task configuration.
References
| Link | Resource |
|---|---|
| https://www.cobiansoft.com/ | Product |
| https://www.exploit-db.com/exploits/50789 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/cobian-reflector-rc-local-denial-of-service-via-password-field | Third Party Advisory |
| https://www.exploit-db.com/exploits/50789 | Exploit Third Party Advisory |
Configurations
History
31 Dec 2025, 17:53
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:cobiansoft:reflector:0.9.93:rc1:*:*:*:*:*:* | |
| First Time |
Cobiansoft
Cobiansoft reflector |
|
| References | () https://www.cobiansoft.com/ - Product | |
| References | () https://www.exploit-db.com/exploits/50789 - Exploit, Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/cobian-reflector-rc-local-denial-of-service-via-password-field - Third Party Advisory |
22 Dec 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-22 22:15
Updated : 2025-12-31 17:53
NVD link : CVE-2022-50689
Mitre link : CVE-2022-50689
CVE.ORG link : CVE-2022-50689
JSON object : View
Products Affected
cobiansoft
- reflector
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
