10 CVE-2025-47812
CISA Kev Catalog Exploit
In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
https://nvd.nist.gov/vuln/detail/CVE-2025-47812
Categories
CWE-158 : Improper Neutralization of Null Byte or NUL Character
As data is parsed, an injected NUL character or null byte may cause the product to believe the input is terminated earlier than it actually is, or otherwise cause the input to be misinterpreted. This could then be used to inject potentially dangerous input that occurs after the null byte or otherwise bypass validation routines and other protection mechanisms.
References
134c704f-9b21-4f2e-91b3-4a467353bcc0 Exploit
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-20... US Government Resource |
| https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-... Exploit Third Party Advisory |
cve@mitre.org Exploit
| https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-202... Exploit Third Party Advisory |
| https://www.vicarius.io/vsociety/posts/cve-2025-47812-detection-script-remote... Third Party Advisory |
| https://www.vicarius.io/vsociety/posts/cve-2025-47812-mitigation-script-remot... Mitigation Third Party Advisory |
| https://www.wftpserver.com Product |
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:wftpserver:wing_ftp_server:*:*:*:*:*:*:*:* | < 7.4.4 | |
REMEDIATION
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
Other Nist (github, ...)
| Url |
|---|
| https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-... |
| https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-202... |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| 52 | Embedding NULL Bytes |
High |
| 53 | Postfix, Null Terminate, and Backslash |
High |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
