CVE-2010-10014
Odin Secure FTP <= 4.1 - Buffer Overflow
Title source: llmDescription
Odin Secure FTP <= 4.1 is vulnerable to a stack-based buffer overflow when parsing directory listings received in response to an FTP LIST command. A malicious FTP server can send an overly long filename in the directory listing, which overflows a fixed-size stack buffer in the client and overwrites the Structured Exception Handler (SEH). This allows remote attackers to execute arbitrary code on the client system.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16716
metasploit
WORKING POC
GOOD
by rick2600 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/ftp/odin_list_reply.rb
References (5)
Scores
EPSS
0.5749
EPSS Percentile
98.1%
Classification
CWE
CWE-121
Status
draft
Timeline
Published
Aug 20, 2025
Tracked Since
Feb 18, 2026