CVE-2025-47812 - Wing FTP Server Remote Code Execution (RCE)
by thermos - Monday July 28, 2025 at 02:54 PM
#1
This vulnerability originates from Wing FTP Server's improper handling of NULL bytes within the username parameter during the authentication process. This allows attackers to inject Lua code directly into session files. These malicious session files are then executed when a valid session is loaded, leading to arbitrary command execution on the server.

Key features of this exploit include:

Remote Code Execution: Execute any command you choose on the target server.
Root/SYSTEM Privileges: Often achieves RCE with the highest system privileges due to the default configurations of Wing FTP Server.
Anonymous Access Exploitation: Can be leveraged even if only anonymous logins are permitted on the server.
Batch Scanning: Scan multiple targets by providing a list of URLs from a file.
Custom Command Execution: Specify and run any command you need on the vulnerable server.


Hidden Content
You must register or login to view this content.

Reply
#2
(07-28-2025, 02:54 PM)thermos Wrote: This vulnerability originates from Wing FTP Server's improper handling of NULL bytes within the username parameter during the authentication process. This allows attackers to inject Lua code directly into session files. These malicious session files are then executed when a valid session is loaded, leading to arbitrary command execution on the server.

Key features of this exploit include:

Remote Code Execution: Execute any command you choose on the target server.
Root/SYSTEM Privileges: Often achieves RCE with the highest system privileges due to the default configurations of Wing FTP Server.
Anonymous Access Exploitation: Can be leveraged even if only anonymous logins are permitted on the server.
Batch Scanning: Scan multiple targets by providing a list of URLs from a file.
Custom Command Execution: Specify and run any command you need on the vulnerable server.

let's check! Thanks you!
Reply
#3
omg i need  this
Reply
#4
(07-28-2025, 02:54 PM)thermos Wrote: This vulnerability originates from Wing FTP Server's improper handling of NULL bytes within the username parameter during the authentication process. This allows attackers to inject Lua code directly into session files. These malicious session files are then executed when a valid session is loaded, leading to arbitrary command execution on the server.

Key features of this exploit include:

Remote Code Execution: Execute any command you choose on the target server.
Root/SYSTEM Privileges: Often achieves RCE with the highest system privileges due to the default configurations of Wing FTP Server.
Anonymous Access Exploitation: Can be leveraged even if only anonymous logins are permitted on the server.
Batch Scanning: Scan multiple targets by providing a list of URLs from a file.
Custom Command Execution: Specify and run any command you need on the vulnerable server.
thank you brother
Reply
#5
thank you!very good
Reply
#6
thanks for sharing.
Reply
#7
(07-28-2025, 02:54 PM)thermos Wrote: This vulnerability originates from Wing FTP Server's improper handling of NULL bytes within the username parameter during the authentication process. This allows attackers to inject Lua code directly into session files. These malicious session files are then executed when a valid session is loaded, leading to arbitrary command execution on the server.

Key features of this exploit include:

Remote Code Execution: Execute any command you choose on the target server.
Root/SYSTEM Privileges: Often achieves RCE with the highest system privileges due to the default configurations of Wing FTP Server.
Anonymous Access Exploitation: Can be leveraged even if only anonymous logins are permitted on the server.
Batch Scanning: Scan multiple targets by providing a list of URLs from a file.
Custom Command Execution: Specify and run any command you need on the vulnerable server.

Let me try, thanks
Reply
#8
policewatchso my have a handsome boy
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  CVE-2025-29927 - POC loganpaul09 26 1,182 08-06-2025, 01:12 PM
Last Post: Fuc0
  Nginx RCE - 2025 - March loganpaul09 5 442 08-04-2025, 01:58 AM
Last Post: CLOBELSECTEAM
  !Next.js Middleware Bypass (CVE-2025-29927) Rat1337 16 749 08-03-2025, 11:17 AM
Last Post: icebear223
  CVE-2025-53770 - Microsoft Sharepoint Unauthenticated RCE antisocial 1 179 07-28-2025, 10:50 AM
Last Post: Krypt3d4ng3l
  POC CVE-2025-24071 caca28sapo1 13 671 04-14-2025, 10:23 PM
Last Post: rainsec

Forum Jump:


 Users browsing this thread: 2 Guest(s)