Stack-based Buffer Overflow in i-Ftp 2.20 Vulnerability
CVE-2014-125114

8.4HIGH

Key Information:

Vendor

I-ftp

Status
Vendor
CVE Published:
25 July 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2014-125114?

A stack-based buffer overflow vulnerability impacts i-Ftp version 2.20, caused by inadequate handling of the Time attribute in the Schedule.xml file. An attacker can exploit this vulnerability by placing a malicious Schedule.xml file in the application directory, leading to a potential buffer overflow during the parsing process of scheduled downloads. This flaw raises the risk of arbitrary code execution or application crashes, making it crucial for users to apply patches or implement mitigation strategies promptly.

Affected Version(s)

i-Ftp 2.20

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

metacom
.
CVE-2014-125114 : Stack-based Buffer Overflow in i-Ftp 2.20 Vulnerability