Description
FileZilla Client 3.63.1 contains a DLL hijacking vulnerability that allows attackers to execute malicious code by placing a crafted TextShaping.dll in the application directory. Attackers can generate a reverse shell payload using msfvenom and replace the missing DLL to achieve remote code execution when the application launches.
Problem types
Uncontrolled Search Path Element
Product status
Credits
Bilal Qureshi
References
www.exploit-db.com/exploits/51267 (ExploitDB-51267)
filezilla-project.org/ (Official Product Homepage)
www.vulncheck.com/...ll-hijacking-via-missing-textshapingdll (VulnCheck Advisory: FileZilla Client 3.63.1 DLL Hijacking via Missing TextShaping.dll)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.