top of page
perceptive_background_267k.jpg

Core FTP 2.0 build 653 contains a denial of service vulnerability in the PBSZ command that allows unauthenticated attackers to crash the service by sending a ma…

Published:

4 April 2026 at 22:00:00

Alert date:

5 April 2026 at 22:09:04

Source:

nvd.nist.gov

Click to open the original link from this advisory

Network Infrastructure

Core FTP 2.0 build 653 contains a denial of service vulnerability in the PBSZ command that allows unauthenticated attackers to crash the FTP server. The vulnerability is triggered when attackers send a PBSZ command with a payload exceeding 211 bytes, causing an access violation and crashing the server process. This is a buffer overflow vulnerability that does not require authentication to exploit. The vulnerability affects Core FTP Server version 2.0 build 653 specifically. Exploitation results in service disruption through process crashes.

Technical details

Mitigation steps:

Affected products:

Core FTP

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page