We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A stack-based buffer overflow vulnerability exists in Easy File Sharing HTTP Server version 7.2. The flaw is triggered when a crafted POST request is sent to the /sendemail.ghp endpoint containing an overly long Email parameter. The application fails to properly validate the length of this field, resulting in a memory corruption condition. An unauthenticated remote attacker can exploit this to execute arbitrary code with the privileges of the server process.
Reserved 2025-04-15 | Published 2025-07-10 | Updated 2025-07-11 | Assigner VulnCheckCWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
bl4ck h4ck3r
raw.githubusercontent.com/...ws/http/easyfilesharing_post.rb
www.exploit-db.com/exploits/42186
vulncheck/...s/easy-file-sharing-http-server-buffer-overflow
Support options