A buffer overflow in the g_cfg.MaxUsers component of LightFTP v2.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
References
| Link | Resource |
|---|---|
| https://github.com/hfiref0x/LightFTP | Product |
| https://shimo.im/docs/9030JMJpv4IM4Nkw | Exploit Third Party Advisory |
Configurations
History
05 Dec 2025, 21:50
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Hfiref0x
Hfiref0x lightftp |
|
| CPE | cpe:2.3:a:hfiref0x:lightftp:2.0:*:*:*:*:*:*:* | |
| References | () https://github.com/hfiref0x/LightFTP - Product | |
| References | () https://shimo.im/docs/9030JMJpv4IM4Nkw - Exploit, Third Party Advisory |
01 Dec 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CWE | CWE-120 |
01 Dec 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-01 16:15
Updated : 2025-12-05 21:50
NVD link : CVE-2025-65403
Mitre link : CVE-2025-65403
CVE.ORG link : CVE-2025-65403
JSON object : View
Products Affected
hfiref0x
- lightftp
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
