We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34107

WinaXe 7.7 FTP Client Remote Buffer Overflow



Description

A buffer overflow vulnerability exists in the WinaXe FTP Client version 7.7 within the FTP banner parsing functionality, WCMDPA10.dll. When the client connects to a remote FTP server and receives an overly long '220 Server Ready' response, the vulnerable component responsible for parsing the banner overflows a stack buffer, leading to arbitrary code execution under the context of the user.

Reserved 2025-04-15 | Published 2025-07-15 | Updated 2025-07-15 | Assigner VulnCheck


HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unknown

7.7
affected

Credits

hyp3rlinx finder

References

raw.githubusercontent.com/...dows/ftp/winaxe_server_ready.rb exploit

hyp3rlinx.altervista.org/...LIENT-REMOTE-BUFFER-OVERFLOW.txt third-party-advisory exploit

www.exploit-db.com/exploits/40767 exploit

www.vulncheck.com/...na-xe-ftp-client-remote-buffer-overflow third-party-advisory

cve.org (CVE-2025-34107)

nvd.nist.gov (CVE-2025-34107)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34107

Support options

Helpdesk Chat, Email, Knowledgebase