A vulnerability, which was classified as critical, has been found in FreeFloat FTP Server 1.0. Affected by this issue is some unknown functionality of the component PASSIVE Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://fitoxs.com/exploit/exploit-d28993dd71bcf3fbc63ff58db41e5f10a3ff7932e72d9e25c556cf18921a98e3.txt | Exploit |
https://fitoxs.com/exploit/exploit-d28993dd71bcf3fbc63ff58db41e5f10a3ff7932e72d9e25c556cf18921a98e3.txt | Exploit |
https://vuldb.com/?ctiid.311078 | Permissions Required VDB Entry |
https://vuldb.com/?id.311078 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.586990 | Exploit Third Party Advisory VDB Entry |
Configurations
History
09 Jun 2025, 15:02
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:freefloat:ftp_server:1.0:*:*:*:*:*:*:* | |
First Time |
Freefloat ftp Server
Freefloat |
|
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://vuldb.com/?id.311078 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.586990 - Exploit, Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?ctiid.311078 - Permissions Required, VDB Entry | |
References | () https://fitoxs.com/exploit/exploit-d28993dd71bcf3fbc63ff58db41e5f10a3ff7932e72d9e25c556cf18921a98e3.txt - Exploit |
04 Jun 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-04 14:15
Updated : 2025-06-09 15:02
NVD link : CVE-2025-5592
Mitre link : CVE-2025-5592
JSON object : View
Products Affected
freefloat
- ftp_server
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')