In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.83426}

epss

{'score': 0.83375}


Tue, 15 Jul 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Wftpserver
Wftpserver wing Ftp Server
CPEs cpe:2.3:a:wftpserver:wing_ftp_server:*:*:*:*:*:*:*:*
Vendors & Products Wftpserver
Wftpserver wing Ftp Server

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.57304}

epss

{'score': 0.83426}


Mon, 14 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 14 Jul 2025 18:00:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-07-14T00:00:00+00:00', 'dueDate': '2025-08-04T00:00:00+00:00'}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.57304}


Fri, 11 Jul 2025 04:15:00 +0000

Type Values Removed Values Added
Metrics epss

{}


Thu, 10 Jul 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 10 Jul 2025 16:30:00 +0000

Type Values Removed Values Added
Description In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
Weaknesses CWE-158
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-07-10T00:00:00.000Z

Updated: 2025-07-30T01:36:09.424Z

Reserved: 2025-05-10T00:00:00.000Z

Link: CVE-2025-47812

cve-icon Vulnrichment

Updated: 2025-07-10T16:24:38.214Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-10T17:15:47.210

Modified: 2025-07-15T14:43:38.217

Link: CVE-2025-47812

cve-icon Redhat

No data.