Stack-Based Buffer Overflow in FTPPad - A Vulnerability Overview
CVE-2010-20108
Key Information:
- Vendor
Ftppad
- Status
- Vendor
- CVE Published:
- 21 August 2025
Badges
What is CVE-2010-20108?
FTPPad versions up to 1.2.0 are susceptible to a stack-based buffer overflow due to improper input validation in the FTP directory listing parser. When connecting to an FTP server, if a client receives an excessively long response from a LIST command, this can lead to a buffer overflow by overwriting the saved Extended Instruction Pointer (EIP). This vulnerability can be exploited by remote attackers to execute arbitrary code, posing significant security risks.
Affected Version(s)
FTPPad FTP Client * <= 1.2.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved