CVE-2013-10042
CRITICALfreeFTPd <1.0.10 - Buffer Overflow
Title source: llmDescription
A stack-based buffer overflow vulnerability exists in freeFTPd version 1.0.10 and earlier in the handling of the FTP PASS command. When an attacker sends a specially crafted password string, the application fails to validate input length, resulting in memory corruption. This can lead to denial of service or arbitrary code execution. Exploitation requires the anonymous user account to be enabled.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Wireghoul · perlremotewindows
https://www.exploit-db.com/exploits/27747
metasploit
WORKING POC
NORMAL
by Wireghoul · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/ftp/freeftpd_pass.rb
References (3)
Scores
CVSS v3
9.8
EPSS
0.6020
EPSS Percentile
98.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-121
Status
published
Products (2)
freeftpd/freeftpd
< 1.0.10
freeFTPd/freeFTPd
< 1.0.10
Published
Jul 31, 2025
Tracked Since
Feb 18, 2026