10 CVE-2025-47812

CISA Kev Catalog Exploit
 

In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
https://nvd.nist.gov/vuln/detail/CVE-2025-47812

Categories

CWE-158 : Improper Neutralization of Null Byte or NUL Character
As data is parsed, an injected NUL character or null byte may cause the product to believe the input is terminated earlier than it actually is, or otherwise cause the input to be misinterpreted. This could then be used to inject potentially dangerous input that occurs after the null byte or otherwise bypass validation routines and other protection mechanisms.

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:wftpserver:wing_ftp_server:*:*:*:*:*:*:*:* < 7.4.4


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
https://github.com/4m3rr0r/CVE-2025-47812-poc
https://github.com/0xcan1337/CVE-2025-47812-poC
https://github.com/ill-deed/WingFTP-CVE-2025-47812-illdeed
https://github.com/pevinkumar10/CVE-2025-47812

Other Nist (github, ...)

Url
https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-...
https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-202...


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
52 Embedding NULL Bytes
High
53 Postfix, Null Terminate, and Backslash
High