Axessh 4.2 contains a denial of service vulnerability in the logging configuration that allows local attackers to crash the application by supplying an excessively long string in the log file name field. Attackers can enable session logging, paste a buffer of 500 or more characters into the log file name parameter, and trigger a crash when establishing a telnet connection.
https://www.vulncheck.com/advisories/axessh-denial-of-service-via-log-file-name
https://www.exploit-db.com/exploits/46858
Published: 2026-03-22
Updated: 2026-03-23
Base Score: 4.9
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N
Severity: Medium
Base Score: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity: Medium
Base Score: 6.9
Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Severity: Medium
EPSS: 0.00012