CVE-2025-47812 Scanner

CVE-2025-47812 Scanner - Remote Code Execution (RCE) vulnerability in Wing FTP Server

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

3 weeks 7 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

Wing FTP Server is widely used by organizations as a robust file transfer solution. It allows users to securely share and manage files using a variety of transfer protocols. Organizations ranging from small businesses to large enterprises utilize Wing FTP Server to enhance file sharing capabilities. This software provides rich functionality, including web-based administration and multi-protocol support for FTP, HTTP, and more. Additionally, it supports secure file transfer and remote management to optimize organizational workflows. The software is primarily used in environments where efficient, secure data transfer is critical.

The detected vulnerability is a Remote Code Execution (RCE) flaw in Wing FTP Server versions prior to 7.4.4. It arises from improper handling of NULL bytes in the 'username' parameter during login. This flaw allows Lua code injection into session files, which are then executed when accessing authenticated endpoints like /dir.html. The execution of these session files results in arbitrary command execution with elevated privileges. This vulnerability is notably exploitable only when anonymous login is active on the server, making it a severe security risk.

Technical details of the vulnerability can be attributed to an endpoint exposed by the server which fails to properly sanitize input data. The vulnerable endpoint, specifically /loginok.html, can be exploited by injecting malicious Lua code through the 'username' parameter during login. Due to insufficient validation, the server processes these injections, creating an exploitable condition. Consequently, unauthorized and arbitrary commands can be executed by accessing endpoints such as /dir.html. This can lead to significant unauthorized access and control over the server environment.

Exploiting this vulnerability may have severe implications, including unauthorized command execution and potential control of server resources. Such exploitation can potentially lead to data compromise, unauthorized data access, and possible manipulation or corruption of sensitive information. The elevated privileges achieved through exploitation could also allow attackers to further exploit other vulnerabilities or steal confidential information. Ultimately, these security breaches can result in significant damages, especially if critical infrastructure or sensitive data are involved.

REFERENCES

Get started to protecting your digital assets