We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A stack-based buffer overflow vulnerability exists in i-Ftp version 2.20 due to improper handling of the Time attribute within Schedule.xml. By placing a specially crafted Schedule.xml file in the i-Ftp application directory, a remote attacker can trigger a buffer overflow during scheduled download parsing, potentially leading to arbitrary code execution or a crash.
Reserved 2025-07-24 | Published 2025-07-25 | Updated 2025-07-25 | Assigner VulnCheckCWE-121 Stack-based Buffer Overflow
CWE-20 Improper Input Validation
metacom
raw.githubusercontent.com/...fileformat/iftp_schedule_bof.rb
www.exploit-db.com/exploits/35177
www.exploit-db.com/exploits/35671
www.vulncheck.com/...tp-schedule-stack-based-buffer-overflow
nvd.nist.gov (CVE-2014-125114)
Support options