We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication.
Reserved 2025-08-05 | Published 2025-08-05 | Updated 2025-08-05 | Assigner VulnCheckCWE-121 Stack-based Buffer Overflow
D35m0nd142
0v3r
raw.githubusercontent.com/...indows/ftp/freefloatftp_user.rb
www.exploit-db.com/exploits/23243
my.saintcorporation.com/...nfo/freefloat_ftp_server_user_cmd
www.exploit-db.com/exploits/15689
web.archive.org/...0029/http://secunia.com/advisories/42465/
web.archive.org/...://www.freefloat.com/sv/about-/about-.php
www.vulncheck.com/...ftp-server-user-command-buffer-overflow
Support options