We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A buffer overflow vulnerability exists in the WinaXe FTP Client version 7.7 within the FTP banner parsing functionality, WCMDPA10.dll. When the client connects to a remote FTP server and receives an overly long '220 Server Ready' response, the vulnerable component responsible for parsing the banner overflows a stack buffer, leading to arbitrary code execution under the context of the user.
Reserved 2025-04-15 | Published 2025-07-15 | Updated 2025-07-15 | Assigner VulnCheckCWE-121 Stack-based Buffer Overflow
hyp3rlinx
raw.githubusercontent.com/...dows/ftp/winaxe_server_ready.rb
hyp3rlinx.altervista.org/...LIENT-REMOTE-BUFFER-OVERFLOW.txt
www.exploit-db.com/exploits/40767
www.vulncheck.com/...na-xe-ftp-client-remote-buffer-overflow
Support options