Home

Description

Gekko Manager FTP Client <= 0.77 contains a stack-based buffer overflow in its FTP directory listing parser. When processing a server response to a LIST command, the client fails to properly validate the length of filenames. A crafted response containing an overly long filename can overwrite the Structured Exception Handler (SEH), potentially allowing remote code execution.

PUBLISHED Reserved 2025-08-19 | Published 2025-08-21 | Updated 2025-08-22 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unaffected

*
affected

Credits

nullthreat finder

References

raw.githubusercontent.com/...dows/ftp/gekkomgr_list_reply.rb exploit

www.exploit-db.com/exploits/16728 exploit

www.gekkomanager.com/ product

web.archive.org/...ex.php/2010/10/12/death-of-an-ftp-client/ technical-description exploit

www.vulncheck.com/...anager-ftp-client-stack-buffer-overflow third-party-advisory

cve.org (CVE-2010-20034)

nvd.nist.gov (CVE-2010-20034)

Download JSON