Stack-Based Buffer Overflow in FTPPad - A Vulnerability Overview
CVE-2010-20108
Key Information:
- Vendor
Ftppad
- Status
- Vendor
- CVE Published:
- 21 August 2025
Badges
What is CVE-2010-20108?
FTPPad versions up to 1.2.0 are susceptible to a stack-based buffer overflow due to improper input validation in the FTP directory listing parser. When connecting to an FTP server, if a client receives an excessively long response from a LIST command, this can lead to a buffer overflow by overwriting the saved Extended Instruction Pointer (EIP). This vulnerability can be exploited by remote attackers to execute arbitrary code, posing significant security risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
FTPPad FTP Client * <= 1.2.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
17% chance of being exploited in the next 30 days.
CVSS V4
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
