PT-2025-27480 · Wing Ftp · Wing Ftp Server
Julien Ahrens
·
Published
2025-06-30
·
Updated
2025-07-17
·
CVE-2025-47812
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Wing FTP Server versions prior to 7.4.4
**Description:**
Wing FTP Server is vulnerable to a remote code execution (RCE) flaw due to improper handling of null bytes ('0') in the web interface. This allows attackers to inject arbitrary Lua code into user session files, potentially leading to the execution of arbitrary system commands with FTP service privileges (root or SYSTEM by default). The vulnerability is exploitable even with anonymous FTP accounts. Active exploitation of this vulnerability has been observed in the wild, with attackers attempting to gain system-level access and install malicious software. Approximately 8,103 publicly accessible instances of Wing FTP Server are estimated to be vulnerable, with around 5,004 having a web interface exposed.
**Recommendations:**
Wing FTP Server versions prior to 7.4.4 are vulnerable and should be updated to version 7.4.4 or later immediately.
Exploit
Fix
RCE
Weakness Enumeration
Related Identifiers
Affected Products
References · 184
- 🔥 https://github.com/4m3rr0r/CVE-2025-47812-poc⭐ 11 🔗 6 · Exploit
- 🔥 https://rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812 · Exploit
- 🔥 https://huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-47812-exploited-in-wild · Exploit
- https://bdu.fstec.ru/vul/2025-08471 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-47812 · Security Note
- https://wftpserver.com/serverhistory.htm · Security Note
- https://github.com/MrTuxracer/advisories⭐ 33 🔗 5 · Note
- https://t.me/c/1221721225/12152 · Telegram Post
- https://twitter.com/marty1968558/status/1943399646187180542 · Twitter Post
- https://twitter.com/4m3rr0r/status/1940334726327529484 · Twitter Post
- https://twitter.com/securityRSS/status/1944057014813852028 · Twitter Post
- https://twitter.com/PurpleOps_io/status/1940652355155788184 · Twitter Post
- https://twitter.com/MrTuxracer/status/1939772070583546338 · Twitter Post
- https://twitter.com/DemolisherDigi/status/1943627728932032956 · Twitter Post
- https://twitter.com/zoomeye_team/status/1939952169308000277 · Twitter Post