CVE-2010-10014

Odin Secure FTP <= 4.1 - Buffer Overflow

Title source: llm

Description

Odin Secure FTP <= 4.1 is vulnerable to a stack-based buffer overflow when parsing directory listings received in response to an FTP LIST command. A malicious FTP server can send an overly long filename in the directory listing, which overflows a fixed-size stack buffer in the client and overwrites the Structured Exception Handler (SEH). This allows remote attackers to execute arbitrary code on the client system.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16716
metasploit WORKING POC GOOD
by rick2600 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/ftp/odin_list_reply.rb

Scores

EPSS 0.5749
EPSS Percentile 98.1%

Classification

CWE
CWE-121
Status draft

Timeline

Published Aug 20, 2025
Tracked Since Feb 18, 2026