CVE-2010-20007

Seagull FTP Client <= v3.3 Build 409 - Buffer Overflow

Title source: llm

Description

Seagull FTP Client <= v3.3 Build 409 contains a stack-based buffer overflow vulnerability in its FTP directory listing parser. When the client connects to an FTP server and receives a crafted response to a LIST command containing an excessively long filename, the application fails to properly validate input length, resulting in a buffer overflow that overwrites the Structured Exception Handler (SEH). This may allow remote attackers to execute arbitrary code on the client system. This product line was discontinued and users were advised to use BlueZone Secure FTP instead, at the time of disclosure.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16705
metasploit WORKING POC GOOD
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/ftp/seagull_list_reply.rb

Scores

EPSS 0.1388
EPSS Percentile 94.2%

Classification

CWE
CWE-121
Status draft

Timeline

Published Aug 21, 2025
Tracked Since Feb 18, 2026