We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-4847

FreeFloat FTP Server MLS Command buffer overflow



Description

EN DE

A vulnerability has been found in FreeFloat FTP Server 1.0 and classified as critical. This vulnerability affects unknown code of the component MLS Command Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

In FreeFloat FTP Server 1.0 wurde eine kritische Schwachstelle gefunden. Das betrifft eine unbekannte Funktionalität der Komponente MLS Command Handler. Durch das Manipulieren mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.

Reserved 2025-05-16 | Published 2025-05-18 | Updated 2025-05-19 | Assigner VulDB


MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
HIGH: 7.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
HIGH: 7.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5AV:N/AC:L/Au:N/C:P/I:P/A:P

Problem types

Buffer Overflow

Memory Corruption

Product status

1.0
affected

Timeline

2025-05-16:Advisory disclosed
2025-05-16:VulDB entry created
2025-05-16:VulDB entry last update

Credits

Fernando Mengali (VulDB User) reporter

References

vuldb.com/?id.309316 (VDB-309316 | FreeFloat FTP Server MLS Command buffer overflow) vdb-entry

vuldb.com/?ctiid.309316 (VDB-309316 | CTI Indicators (IOB, IOC)) signature permissions-required

vuldb.com/?submit.572487 (Submit #572487 | FreeFloat FTP Server 1.0 Buffer Overflow) third-party-advisory

fitoxs.com/...8549120ae07caea315e65a6af636072064b431c94f.txt broken-link exploit

cve.org (CVE-2025-4847)

nvd.nist.gov (CVE-2025-4847)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-4847

Support options

Helpdesk Chat, Email, Knowledgebase