Denial of Service Vulnerability in SpotFTP-FTP Password Recover by NSA
CVE-2020-37122
6.7MEDIUM
Key Information:
- Vendor
Nsauditor
- Status
- Vendor
- CVE Published:
- 6 February 2026
Badges
๐พ Exploit Exists๐ก Public PoC
What is CVE-2020-37122?
SpotFTP-FTP Password Recover version 2.4.8 is susceptible to a denial of service attack due to a buffer overflow vulnerability. Attackers can exploit this weakness by providing a specially crafted registration code comprising 1000 'Z' characters, leading the application to crash. This vulnerability underscores the importance of robust input validation to prevent larger malicious attacks.
Affected Version(s)
FTP Password Recover 2.4.8
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Score:
6.7
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Ismael Nava
