CVE-2010-20113
CRITICALEasyftp Server < 1.7.0.12 - Stack Buffer Overflow
Title source: ruleDescription
EasyFTP Server 1.7.0.11 and earlier contains a stack-based buffer overflow vulnerability in its HTTP interface. When processing a GET request to list.html, the server fails to properly validate the length of the path parameter. Supplying an excessively long value causes a buffer overflow on the stack, potentially corrupting control flow structures. The vulnerability is exposed through the embedded web server and does not require authentication due to default anonymous access. The issue was resolved in version 1.7.0.12, after which the product was renamed to UplusFtp.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by ThE g0bL!N · pythonremotewindows
https://www.exploit-db.com/exploits/11500
metasploit
WORKING POC
GREAT
by ThE g0bL!N · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/easyftp_list.rb
References (3)
Scores
CVSS v3
9.8
EPSS
0.6271
EPSS Percentile
98.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-121
Status
published
Products (2)
easyftp_server_project/easyftp_server
< 1.7.0.12
KMiNT21 Software/EasyFTP Server
< 1.7.0.11
Published
Aug 21, 2025
Tracked Since
Feb 18, 2026