Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-2523

EPSS 94.27% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2011-2523

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
vsftpd 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
vsftpd是一款用于类Unix系统的FTP(文件传输协议)服务器。 vsftpd 2.3.4版本(2011年6月30日至2011年7月3日期间下载)中存在安全漏洞,该漏洞源于软件中存在可以打开shell的后门。攻击者可利用该漏洞执行命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
vsftpdvsftpd 2.3.4 downloaded between 20110630 and 20110703 -

II. Public POCs for CVE-2011-2523

#POC DescriptionSource LinkShenlong Link
1An exploit to get root in vsftpd 2.3.4 (CVE-2011-2523) written in pythonhttps://github.com/HerculesRD/vsftpd2.3.4PyExploitPOC Details
2vsftpd 2.3.4 Backdoor Exploithttps://github.com/nobodyatall648/CVE-2011-2523POC Details
3https://www.exploit-db.com/exploits/49757https://github.com/Gr4ykt/CVE-2011-2523POC Details
4Python exploit for vsftpd 2.3.4 - Backdoor Command Executionhttps://github.com/padsalatushal/CVE-2011-2523POC Details
5FreePascal implementation of the vsFTPD 2.3.4 CVE-2011-2523https://github.com/MFernstrom/OffensivePascal-CVE-2011-2523POC Details
6Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)https://github.com/0xSojalSec/-CVE-2011-2523POC Details
7Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)https://github.com/0xSojalSec/CVE-2011-2523POC Details
8Nonehttps://github.com/XiangSi-Howard/CTF---CVE-2011-2523POC Details
9CVE-2011-2523 exploithttps://github.com/0xFTW/CVE-2011-2523POC Details
10Python exploit for vsftpd 2.3.4 - Backdoor Command Executionhttps://github.com/Lynk4/CVE-2011-2523POC Details
11Python exploit for vsftpd 2.3.4 - Backdoor Command Execution https://github.com/vaishnavucv/CVE-2011-2523POC Details
12A tool that exploits the CVE-2011-2523 vulnerability.https://github.com/chleba124/vsftpd-exploitPOC Details
13Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)https://github.com/4m3rr0r/CVE-2011-2523-pocPOC Details
14CVE-2011-2523 exploithttps://github.com/cowsecurity/CVE-2011-2523POC Details
15Nonehttps://github.com/Shubham-2k1/Exploit-CVE-2011-2523POC Details
16A basic script that exploits CVE-2011-2523https://github.com/Tenor-Z/SmileySploitPOC Details
17vsFTPd 2.3.4 Remote Code Execution (CVE-2011-2523) PoChttps://github.com/sug4r-wr41th/CVE-2011-2523POC Details
18POC para CVE-2011-2523https://github.com/Fatalitysec/vsftpd_2.3.4_BackdoorPOC Details
19A Simple Python Program that uses gets a Remote Root Shell on the Target Device by exploiting a Vulnerability (CVE-2011-2523) present in vsFTP 2.3.4https://github.com/Gill-Singh-A/vsFTP-2.3.4-Remote-Root-Shell-ExploitPOC Details
20This tool exploits a well-known backdoor vulnerability found in vsFTPd version 2.3.4 (CVE-2011-2523)https://github.com/everythingBlackkk/vsFTPd-Backdoor-Exploit-CVE-2011-2523-POC Details
21PoC CVE-2011-2523 https://github.com/Uno13x/CVE-2011-2523-PoCPOC Details
22PoC CVE-2011-2523 https://github.com/R4idB0Y/CVE-2011-2523-PoCPOC Details
23PoC CVE-2011-2523 https://github.com/0xB0y426/CVE-2011-2523-PoCPOC Details
24VsFTPd 2.3.4 Backdoor Command Executionhttps://github.com/NullBrunk/CVE-2011-2523POC Details
25CVE-2011-2523 vsftpd 2.3.4 exploithttps://github.com/Lychi3/vsftpd-backdoorPOC Details
26Vulnerability assessment and exploitation of vsftpd 2.3.4 (CVE-2011-2523) using Metasploit. Full report and proof of root access included.https://github.com/vedpakhare/vsftpd-234-vuln-reportPOC Details
27Nonehttps://github.com/madanokr001/CVE-2011-2523POC Details
28VSFTPD v2.3.4 had a serious backdoor vulnerability allowing attackers to execute arbitrary commands on the server with root-level access. The backdoor was triggered by a specific string of characters in a user login request, which allowed attackers to execute any command they wanted. https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2011/CVE-2011-2523.yamlPOC Details
29Laboratorio técnico de ciberseguridad donde se realiza reconocimiento de red con Nmap y explotación de la vulnerabilidad CVE-2011-2523 (vsftpd 2.3.4) mediante Metasploit Framework. Proyecto académico orientado a demostrar habilidades en análisis de vulnerabilidades, uso de herramientas de pentesting y reporte técnico. https://github.com/JohanMV/explotacion-vsftpd-nmap_Laboratorio_1POC Details
30Exploit for CVE-2011-2523.https://github.com/lghost256/vsftpd234-exploitPOC Details
31Nonehttps://github.com/hklabCR/CVE-2011-2523POC Details
32 Python exploit for vsftpd 2.3.4 - Backdoor Command Execution https://github.com/krill-x7/CVE-2011-2523POC Details
33Nonehttps://github.com/cybermads/CVE-2011-2523POC Details
34A classic Exploit updated for vsftpd backdoor 2.3.4https://github.com/As9xm/BrokenDoor-CVE-2011-2523-POC Details
35Python exploit for vsftpd 2.3.4 - Backdoor Command Executionhttps://github.com/BolivarJ/CVE-2011-2523POC Details
36A step-by-step walkthrough of exploiting the vsFTPd 2.3.4 backdoor vulnerability (CVE-2011-2523) in a controlled lab environment, demonstrating reconnaissance, exploitation with Metasploit, and establishing a reverse shell.https://github.com/seerat-fatima21/vsftpd-exploitPOC Details
37his project demonstrates the exploitation of the vsFTPd 2.3.4 backdoor vulnerability (CVE-2011-2523) using Metasploitable 2 and Kali Linux with Metasploit. It includes reconnaissance, exploitation, and defensive measures, with a detailed report and lab setup for learning ethical hacking and security best practices.https://github.com/hajisthabegum/Exploiting-vsFTPd-2.3.4-Backdoor-Vulnerability-Ethical-Hacking-Lab-with-Metasploitable-2-MetasploitPOC Details
38Explotacion de la version 2.3.4 de vsftpd automatizada https://github.com/avivyap/CVE-2011-2523POC Details
39Comprehensive Penetration Testing report and exploit chain for Metasploitable 2 focusing on CVE-2011-2523.https://github.com/KlyneZyro/Metasploitable2-VAPT-ReportPOC Details
40Full-lifecycle penetration test of a legacy Linux environment (Metasploitable 2) emulated on Apple Silicon. Demonstrating network reconnaissance, RCE via service backdoors (CVE-2011-2523), and cryptographic credential recovery.https://github.com/Mirza-22144/Vulnerability-Assessment-Exploitation-LabPOC Details
41vsftpd 2.3.4 (CVE-2011-2523) a critical vulnerability that leads to Reverse Root Shell. In this repo I will do a PoC how to exploit it step by step, Manually & Automatically (Python) for educational purposes.https://github.com/tshaq17/vsftpd-2.3.4---Backdoor-Command-ExecutionPOC Details
42Metasploitable 2 üzerinde vsftpd 2.3.4 (CVE-2011-2523) zafiyetinin istismarı ve sızma sonrası adımlarını içeren laboratuvar çalışması.https://github.com/Efehamzaa/Metasploit-Red-Pentest-LabPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2011-2523

登录查看更多情报信息。

V. Comments for CVE-2011-2523

Anonymous User
2026-01-15 06:08:57

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


Leave a comment