We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-47812



Description

In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.

Reserved 2025-05-10 | Published 2025-07-10 | Updated 2025-07-11 | Assigner mitre


CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-158 Improper Neutralization of Null Byte or NUL Character

Product status

Default status
unaffected

Any version before 7.4.4
affected

References

www.wftpserver.com

www.rcesecurity.com/...l-wing-ftp-server-rce-cve-2025-47812/

cve.org (CVE-2025-47812)

nvd.nist.gov (CVE-2025-47812)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-47812

Support options

Helpdesk Chat, Email, Knowledgebase