CVE-2018-25226
FTPShell Server 6.83 Denial of Service via Account Name
CVSS Score
6.2
EPSS Score
0.0%
EPSS Percentile
2th
FTPShell Server 6.83 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an excessively long string in the account name field. Attackers can trigger a denial of service by pasting a 417-byte payload into the 'Account name to ban' parameter within the Manage FTP Accounts interface.
| CWE | CWE-787 |
| Vendor | ftpshell |
| Product | ftpshell server |
| Published | Mar 30, 2026 |
| Last Updated | Mar 30, 2026 |
Stay Ahead of the Next One
Get instant alerts for ftpshell ftpshell server
Be the first to know when new medium vulnerabilities affecting ftpshell ftpshell server are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Affected Versions
Ftpshell / FTPShell Server
6.83
References
Credits
Victor Mondragón