CVE-2010-20007
Seagull FTP Client <= v3.3 Build 409 - Buffer Overflow
Title source: llmDescription
Seagull FTP Client <= v3.3 Build 409 contains a stack-based buffer overflow vulnerability in its FTP directory listing parser. When the client connects to an FTP server and receives a crafted response to a LIST command containing an excessively long filename, the application fails to properly validate input length, resulting in a buffer overflow that overwrites the Structured Exception Handler (SEH). This may allow remote attackers to execute arbitrary code on the client system. This product line was discontinued and users were advised to use BlueZone Secure FTP instead, at the time of disclosure.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16705
metasploit
WORKING POC
GOOD
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/ftp/seagull_list_reply.rb
References (6)
Scores
EPSS
0.1388
EPSS Percentile
94.2%
Classification
CWE
CWE-121
Status
draft
Timeline
Published
Aug 21, 2025
Tracked Since
Feb 18, 2026