CVE-2012-10023
CRITICALFreeFloat FTP Server 1.0.0 - Buffer Overflow
Title source: llmDescription
A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by D35m0nd142 · pythonremotewindows
https://www.exploit-db.com/exploits/23243
exploitdb
WORKING POC
VERIFIED
by 0v3r · pythonremotewindows
https://www.exploit-db.com/exploits/15689
metasploit
WORKING POC
NORMAL
by D35m0nd142 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/ftp/freefloatftp_user.rb
References (7)
Scores
CVSS v3
9.8
EPSS
0.7059
EPSS Percentile
98.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-121
Status
published
Products (2)
freefloat/freefloat_ftp_server
1.0
FreeFloat/FTP Server
Published
Aug 05, 2025
Tracked Since
Feb 18, 2026