Stack-based Buffer Overflow in i-Ftp 2.20 Vulnerability
CVE-2014-125114

8.4HIGH

Key Information:

Vendor

I-ftp

Status
Vendor
CVE Published:
25 July 2025

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC🟣 EPSS 19%

What is CVE-2014-125114?

A stack-based buffer overflow vulnerability impacts i-Ftp version 2.20, caused by inadequate handling of the Time attribute in the Schedule.xml file. An attacker can exploit this vulnerability by placing a malicious Schedule.xml file in the application directory, leading to a potential buffer overflow during the parsing process of scheduled downloads. This flaw raises the risk of arbitrary code execution or application crashes, making it crucial for users to apply patches or implement mitigation strategies promptly.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

i-Ftp 2.20

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

19% chance of being exploited in the next 30 days.

CVSS V4

Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

metacom
.