We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2012-10035

Turbo FTP Server 1.30.823/826 PORT Command Buffer Overflow



Description

Turbo FTP Server versions 1.30.823 and 1.30.826 contain a buffer overflow vulnerability in the handling of the PORT command. By sending a specially crafted payload, an unauthenticated remote attacker can overwrite memory structures and execute arbitrary code with SYSTEM privileges.

Reserved 2025-08-05 | Published 2025-08-05 | Updated 2025-08-05 | Assigner VulnCheck


CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
unaffected

1.30.823
affected

1.30.826
affected

Credits

Zhao Liang finder

References

raw.githubusercontent.com/...ts/windows/ftp/turboftp_port.rb exploit

www.exploit-db.com/exploits/22161 exploit

www.vulncheck.com/...ftp-server-port-command-buffer-overflow third-party-advisory

cve.org (CVE-2012-10035)

nvd.nist.gov (CVE-2012-10035)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2012-10035

Support options

Helpdesk Chat, Email, Knowledgebase