CVE-2006-6183
3com 3ctftpsvc < 2.0.1 - Memory Corruption
Title source: ruleDescription
Multiple stack-based buffer overflows in 3Com 3CTftpSvc 2.0.1, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long mode field (aka transporting mode) in a (1) GET or (2) PUT command.
Exploits (6)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16347
exploitdb
WORKING POC
VERIFIED
by Umesh Wanve · perlremotewindows
https://www.exploit-db.com/exploits/3388
exploitdb
WORKING POC
VERIFIED
by cthulhu · rubyremotewindows
https://www.exploit-db.com/exploits/2865
exploitdb
WORKING POC
VERIFIED
by Liu Qixu · pythondoswindows
https://www.exploit-db.com/exploits/2855
metasploit
WORKING POC
GREAT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/tftp/threectftpsvc_long_mode.rb
References (7)
Scores
EPSS
0.5146
EPSS Percentile
97.9%
Details
CWE
CWE-119
Status
published
Products (1)
3com/3ctftpsvc
< 2.0.1
Published
Dec 01, 2006
Tracked Since
Feb 18, 2026