CVE-2019-25607
Axessh 4.2 Local Stack-based Buffer Overflow via Log File Name
CVSS Score
8.4
EPSS Score
0.0%
EPSS Percentile
2th
Axessh 4.2 contains a stack-based buffer overflow vulnerability in the log file name field that allows local attackers to execute arbitrary code by supplying an excessively long filename. Attackers can overflow the buffer at offset 214 bytes to overwrite the instruction pointer and execute shellcode with system privileges.
| CWE | CWE-787 |
| Vendor | labf |
| Product | axessh |
| Published | Mar 22, 2026 |
| Last Updated | Mar 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for labf axessh
Be the first to know when new high vulnerabilities affecting labf axessh are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Labf / Axessh
4.2
References
exploit-db.com: https://www.exploit-db.com/exploits/46922 labf.com: http://www.labf.com labf.com: http://www.labf.com/download/axessh.exe exploit-db.com: https://www.exploit-db.com/exploits/46858 exploit-db.com: https://www.exploit-db.com/shellcodes/46281 vulncheck.com: https://www.vulncheck.com/advisories/axessh-local-stack-based-buffer-overflow-via-log-file-name
Credits
Uday Mittal (https://github.com/yaksas443/YaksasCSC-Lab/)