Overview
In the ever-evolving world of cybersecurity, a newly discovered vulnerability in Wing FTP Server has triggered alarm bells for system administrators and security professionals alike. This vulnerability, designated as CVE-2025-47812, is a serious security flaw that could lead to system compromise and data leakage if exploited.
The vulnerability affects Wing FTP Server versions before 7.4.4 and has the potential to pose a significant threat to businesses and individuals using this software. The ability for an attacker to inject arbitrary Lua code into user session files, and consequently execute arbitrary system commands, presents a severe security risk. This is why the vulnerability matters to the wider cybersecurity community and anyone using Wing FTP Server.
Vulnerability Summary
CVE ID: CVE-2025-47812
Severity: Critical (CVSS: 10.0)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Remote code execution leading to system compromise and potential data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Wing FTP Server | Before 7.4.4
How the Exploit Works
The exploit works by mishandling ‘\0’ bytes in the user and admin web interfaces. This allows an attacker to inject arbitrary Lua code into user session files. The injected code can then be used to execute arbitrary system commands with the privileges of the FTP service, which is root or SYSTEM by default. This exploit can even be carried out via anonymous FTP accounts, making it highly dangerous and easy to exploit.
Conceptual Example Code
Given the severity of this vulnerability, we will not provide actual exploit code. However, below is a conceptual example of how an HTTP request exploiting this vulnerability might look:
POST /admin/session HTTP/1.1
Host: target.example.com
Content-Type: application/json
{ "session_data": "...\0...; os.execute('rm -rf /')" }
In this pseudocode example, an HTTP POST request is sent to the `/admin/session` endpoint. A ‘\0’ byte is included in the session data, followed by a semicolon and an arbitrary Lua command. The `os.execute(‘rm -rf /’)` command is an example of a potentially destructive system command that could be executed on the server if the vulnerability is exploited.
Please note that this is a conceptual example and should not be used in a real-world scenario. Always follow ethical hacking practices and never exploit vulnerabilities without authorization.