We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2014-125114

i-Ftp 2.20 Schedule.xml Stack-Based Buffer Overflow



Description

A stack-based buffer overflow vulnerability exists in i-Ftp version 2.20 due to improper handling of the Time attribute within Schedule.xml. By placing a specially crafted Schedule.xml file in the i-Ftp application directory, a remote attacker can trigger a buffer overflow during scheduled download parsing, potentially leading to arbitrary code execution or a crash.

Reserved 2025-07-24 | Published 2025-07-25 | Updated 2025-07-25 | Assigner VulnCheck


HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

CWE-20 Improper Input Validation

Product status

Default status
unknown

2.20
affected

Credits

metacom finder

References

raw.githubusercontent.com/...fileformat/iftp_schedule_bof.rb exploit

www.exploit-db.com/exploits/35177 exploit

www.exploit-db.com/exploits/35671 exploit

www.vulncheck.com/...tp-schedule-stack-based-buffer-overflow third-party-advisory

cve.org (CVE-2014-125114)

nvd.nist.gov (CVE-2014-125114)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2014-125114

Support options

Helpdesk Chat, Email, Knowledgebase