exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/16311
This Metasploit module exploits a format string vulnerability in wu-ftpd versions older than 2.6.1 via SITE EXEC/INDEX commands, allowing arbitrary code execution. It includes automatic targeting and payload delivery mechanisms.
Classification
Working Poc 95%
Target:
wu-ftpd < 2.6.1
Auth required
Prerequisites:
FTP server access · Valid credentials · Vulnerable wu-ftpd version
exploitdb
WORKING POC
VERIFIED
by qitest1 · cremotelinux_x86
https://www.exploit-db.com/exploits/269
This exploit targets a format string vulnerability in BeroFTPD 1.3.4(1) derived from wuftpd, allowing remote code execution via the SITE EXEC command. It uses a combination of shellcode and format string manipulation to achieve arbitrary code execution.
Classification
Working Poc 95%
Target:
BeroFTPD 1.3.4(1)
Auth required
Prerequisites:
Network access to the vulnerable FTP server · Valid credentials for authentication
exploitdb
WRITEUP
VERIFIED
by justme · textremotelinux_x86
https://www.exploit-db.com/exploits/20032
The writeup describes a format string vulnerability in Washington University ftp daemon (wu-ftpd) affecting the SITE EXEC and SITE INDEX commands. The vulnerability allows remote attackers to execute arbitrary commands as root due to improper input validation.
Classification
Writeup 90%
Target:
wu-ftpd (versions affected by CVE-2000-0573)
No auth needed
Prerequisites:
Network access to the vulnerable FTP server · wu-ftpd with SITE EXEC or SITE INDEX enabled
exploitdb
WORKING POC
VERIFIED
by kalou · cremotesolaris
https://www.exploit-db.com/exploits/239
This exploit targets a format string vulnerability in wu-ftpd (CVE-2000-0573) to achieve remote code execution. It constructs a malicious format string to overwrite memory addresses and includes SPARC shellcode for privilege escalation.
Classification
Working Poc 95%
Target:
wu-ftpd (Solaris 2.8)
No auth needed
Prerequisites:
Network access to vulnerable wu-ftpd service · Target architecture must be SPARC
exploitdb
WORKING POC
VERIFIED
by venglin · cremotemultiple
https://www.exploit-db.com/exploits/201
This exploit targets a format string vulnerability in WU-FTPD 2.6.0, allowing remote code execution via the SITE EXEC command. It includes shellcode for both Linux and FreeBSD to spawn a shell, bypassing chroot restrictions.
Classification
Working Poc 95%
Target:
WU-FTPD 2.6.0
Auth required
Prerequisites:
Network access to vulnerable WU-FTPD server · Valid credentials for authentication
exploitdb
WORKING POC
VERIFIED
by vsz_ · cremotelinux
https://www.exploit-db.com/exploits/20031
This exploit targets a format string vulnerability in the SITE EXEC command of wu-ftpd 2.6.0(1), allowing remote code execution as root. It leverages shellcode injection and precise memory manipulation to overwrite return addresses and execute arbitrary commands.
Classification
Working Poc 95%
Target:
wu-ftpd 2.6.0(1)
No auth needed
Prerequisites:
Network access to the target FTP server · Anonymous FTP access enabled
exploitdb
WORKING POC
VERIFIED
by tf8 · cremoteunix
https://www.exploit-db.com/exploits/20030
This exploit targets a format string vulnerability in the SITE EXEC command of wu-ftpd 2.6.0, allowing remote code execution as root. It includes shellcode for various Linux and FreeBSD systems, leveraging the vulnerability to overwrite stack data and redirect execution flow.
Classification
Working Poc 95%
Target:
wu-ftpd 2.6.0
No auth needed
Prerequisites:
Network access to the target FTP server · wu-ftpd 2.6.0 running on the target system