Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-47812 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Critical Remote Code Execution (RCE) in Wing FTP Server. πŸ“‰ **Consequences**: Attackers can execute arbitrary commands with elevated privileges (Root/SYSTEM).…

Q2Root Cause? (CWE/Flaw)

πŸ” **Root Cause**: CWE-158 (Improper Neutralization of Null Byte). πŸ› **Flaw**: Improper NULL byte handling in the `username` parameter during login.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Product**: Wing FTP Server. πŸ“… **Affected Versions**: 7.4.3 and earlier. 🚫 **Fixed Version**: 7.4.4+. 🌐 **Platform**: Cross-platform FTP server software.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Executes code as Root (Linux) or SYSTEM (Windows). πŸ“‚ **Data**: Full read/write access to server files. πŸ› οΈ **Actions**: Arbitrary command execution, reverse shells, and persistent backdoors.

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Threshold**: Low. πŸšͺ **Auth**: Unauthenticated attack vector. πŸ”‘ **Config Requirement**: Anonymous login must be **enabled** on the server. 🎯 **Target**: Specifically targets the `loginok.html` handler.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Exploits**: Yes, multiple public PoCs available. πŸ“‚ **Sources**: GitHub repos (e.g., `4m3rr0r`, `0xcan1337`, `ill-deed`). πŸ§ͺ **Tools**: Nuclei templates and Python scripts for reverse shells.…

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Check**: Scan for Wing FTP Server banners. πŸ§ͺ **Test**: Verify if anonymous login is enabled. πŸ“‘ **Detection**: Look for Lua injection attempts in login parameters.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fix**: Upgrade to **Wing FTP Server 7.4.4** or later. πŸ“₯ **Source**: Official vendor website (wftpserver.com). πŸ”„ **Action**: Immediate patching is the primary mitigation.

Q9What if no patch? (Workaround)

🚫 **Workaround**: **Disable Anonymous Login** immediately. πŸ›‘ **Restrict**: Block external access to FTP ports if possible. 🧹 **Monitor**: Audit session files for Lua injection artifacts.…

Q10Is it urgent? (Priority Suggestion)

πŸ”΄ **Priority**: CRITICAL (CVSS 9.8). ⏳ **Urgency**: Patch immediately. 🚨 **Reason**: Unauthenticated RCE with high impact. πŸ“’ **Action**: Prioritize for all servers with anonymous access enabled.