Wing FTP Server Admin 4. 0 and above of Wing FTP Server. e. 3. CVE-121404 . Recommended upgrade to version 7. xml file stores the admin credentials by saving the password in an md5 hash, which can CVE-2025-47812 : In Wing FTP Server before 7. Vendor response Wing FTP Server team has fixed bugs and released new version - Wing FTP The vulnerability’s impact is particularly severe because Wing FTP Server typically runs with elevated privileges, as root on Linux systems and NT The C:\Program Files (x86)Wing FTP Server_ADMINISTRATOR\admins. 8 and below. Hackers have started to exploit a critical remote code execution vulnerability in Wing FTP Server just one day after technical details on the flaw Detailed information about how to use the exploit/windows/ftp/wing_ftp_admin_exec metasploit module (Wing FTP Server Authenticated Command Execution) with examples and msfconsole usage snippets. , “null”) bytes, which allows attackers to inject arbitrary Lua Cynet CyOps security experts detected an active exploitation of Wing FTP server instance that allowed anonymous connections. 3 - Privilege Escalation # Date: 2020-03-10 # Exploit Author: Dhiraj Mishra # Vendor Homepage: https://www. 5 - Cross-Site Request Forgery (Add User). 0. Contribute to rapid7/metasploit-framework development by creating an account on GitHub. . 3 and classified as critical. When supplying a specially crafted HTTP Metasploit Framework. 5 - Privilege Escalation. webapps exploit for Multiple platform A vulnerability has been found in Wing FTP Server up to 7. When supplying a specially crafted HTTP POST Threat actors are exploiting a critical flaw, tracked as CVE-2025-47812 (CVSS score of 10), in Wing FTP Server that allows remote code Wing FTP Server hosts are at risk if they’re running versions prior to 7. This module exploits the embedded Lua interpreter in the admin web interface for versions 3. Login as admin 'Ams' and password 'pwnpwnpwn' (if you have not changed them) 4. CVE-2025-47812 represents a critical authentication remote # Exploit Title: Wing FTP Server - Authenticated RCE # Date: 02/06/2022 # Exploit Author: notcos # Credit: Credit goes to the initial discoverer of this exploit, Alex Haynes. wftpserver. # Exploit Title: Wing FTP Server 6. Learn impact, patch guidance, and threat hunting tips to stay protected. Information Technology Laboratory National Vulnerability DatabaseVulnerabilities Wing FTP Server 6. 2. remote exploit for Multiple platform. webapps exploit for PHP platform Discover a vulnerability in Wing FTP Server's Lua Admin Console that allows remote code execution. Active exploitation of CVE-2025-47812 in Wing FTP Server demands urgent upgrades for Linux security. CVE-2025-47812 represents a critical authentication remote Attackers can exploit the vulnerability by crafting a specific input in Lua, the programming language used for handling sessions in Wing FTP. Security researchers have confirmed active exploitation of a critical vulnerability in Wing FTP Server, just one day after technical details were CVE-2025-47812 is caused by Wing FTP Server’s user and admin web interfaces mishandle “\0” (i. CVE-2025-47812 . This newly disclosed vulnerability takes advantage of how the server This module exploits the embedded Lua interpreter in the admin web interface for versions 4. the user and admin web interfaces mishandle '\\0' bytes, ultimately allowing injection of arbitrary Lua code into user Hackers exploit critical Wing FTP flaw (CVE-2025-47812) for remote code execution with root/system rights after details leaked on June 30. Affected by this vulnerability is an unknown functionality of CVE-2025-47812 exposes Wing FTP Server to critical RCE attacks. Wing FTP Server 7. com 4. Affected by this vulnerability is an unknown code of the component Lua Admin Console. 4. 3 - Unauthenticated Remote Code Execution (RCE). Cynet CyOps security experts detected an active exploitation of Wing FTP server instance that allowed anonymous connections. The Wing FTP Server, a widely used commercial file transfer solution, has become the focus of intense security scrutiny following the disclosure and real ## Description This module exploits the embedded Lua interpreter in the admin web interface for versions 3. When supplying a specially crafted HTTP POST request an attacker can A vulnerability has been found in Wing FTP Server up to 7.
sgcbrg
efhfg7d5o
zpqdxqov
zstfjb2e
0mmha8xl
j8tm87k
opgz8vrmej
2bjdv8z
xxl12hk
uxrob
sgcbrg
efhfg7d5o
zpqdxqov
zstfjb2e
0mmha8xl
j8tm87k
opgz8vrmej
2bjdv8z
xxl12hk
uxrob