Home

Description

A stack-based buffer overflow vulnerability exists in i-Ftp version 2.20 due to improper handling of the Time attribute within Schedule.xml. By placing a specially crafted Schedule.xml file in the i-Ftp application directory, a remote attacker can trigger a buffer overflow during scheduled download parsing, potentially leading to arbitrary code execution or a crash.

PUBLISHED Reserved 2025-07-24 | Published 2025-07-25 | Updated 2026-04-07 | Assigner VulnCheck




HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

CWE-20 Improper Input Validation

Product status

Default status
unknown

2.20
affected

Credits

metacom finder

References

www.exploit-db.com/exploits/35177 exploit

www.exploit-db.com/exploits/35671 exploit

raw.githubusercontent.com/...fileformat/iftp_schedule_bof.rb exploit

www.exploit-db.com/exploits/35177 exploit

www.exploit-db.com/exploits/35671 exploit

www.vulncheck.com/...tp-schedule-stack-based-buffer-overflow third-party-advisory

cve.org (CVE-2014-125114)

nvd.nist.gov (CVE-2014-125114)

Download JSON