CVE-2010-20113

CRITICAL

Easyftp Server < 1.7.0.12 - Stack Buffer Overflow

Title source: rule

Description

EasyFTP Server 1.7.0.11 and earlier contains a stack-based buffer overflow vulnerability in its HTTP interface. When processing a GET request to list.html, the server fails to properly validate the length of the path parameter. Supplying an excessively long value causes a buffer overflow on the stack, potentially corrupting control flow structures. The vulnerability is exposed through the embedded web server and does not require authentication due to default anonymous access. The issue was resolved in version 1.7.0.12, after which the product was renamed to UplusFtp.

Exploits (2)

exploitdb WORKING POC VERIFIED
by ThE g0bL!N · pythonremotewindows
https://www.exploit-db.com/exploits/11500
metasploit WORKING POC GREAT
by ThE g0bL!N · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/easyftp_list.rb

Scores

CVSS v3 9.8
EPSS 0.6271
EPSS Percentile 98.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-121
Status published
Products (2)
easyftp_server_project/easyftp_server < 1.7.0.12
KMiNT21 Software/EasyFTP Server < 1.7.0.11
Published Aug 21, 2025
Tracked Since Feb 18, 2026