In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 08:15:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Tue, 16 Sep 2025 02:45:00 +0900


Wed, 16 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.83426}

epss

{'score': 0.83375}


Tue, 15 Jul 2025 23:45:00 +0900

Type Values Removed Values Added
First Time appeared Wftpserver
Wftpserver wing Ftp Server
CPEs cpe:2.3:a:wftpserver:wing_ftp_server:*:*:*:*:*:*:*:*
Vendors & Products Wftpserver
Wftpserver wing Ftp Server

Tue, 15 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.57304}

epss

{'score': 0.83426}


Tue, 15 Jul 2025 03:15:00 +0900

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 15 Jul 2025 03:00:00 +0900

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-07-14T00:00:00+00:00', 'dueDate': '2025-08-04T00:00:00+00:00'}


Fri, 11 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.57304}


Fri, 11 Jul 2025 13:15:00 +0900

Type Values Removed Values Added
Metrics epss

{}


Fri, 11 Jul 2025 02:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 11 Jul 2025 01:30:00 +0900

Type Values Removed Values Added
Description In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
Weaknesses CWE-158
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T22:45:22.604Z

Reserved: 2025-05-10T00:00:00.000Z

Link: CVE-2025-47812

cve-icon Vulnrichment

Updated: 2025-07-10T16:24:38.214Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-10T17:15:47.210

Modified: 2025-11-05T19:26:31.650

Link: CVE-2025-47812

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-13T20:06:28Z

Weaknesses