exploitdb
WORKING POC
VERIFIED
by Koby · pythonremotewindows
https://www.exploit-db.com/exploits/38013
This exploit targets a buffer overflow in PCMan's FTP Server v2.0 via the RENAME command. It overwrites EIP with a JMP ESP instruction and executes a shellcode payload to achieve remote code execution.
Classification
Working Poc 95%
Target:
PCMan's FTP Server v2.0.7
Auth required
Prerequisites:
Network access to the FTP server · FTP server running PCMan's FTP Server v2.0.7 · Anonymous or valid credentials for authentication
exploitdb
WORKING POC
VERIFIED
by Sumit · pythonremotewindows
https://www.exploit-db.com/exploits/31789
This exploit triggers a buffer overflow in PCMAN FTP 2.07 by sending a long string as a command, leading to remote code execution via a shellcode payload. The exploit constructs a malicious buffer with padding, EIP overwrite, NOP sled, and shellcode.
Classification
Working Poc 95%
Target:
PCMAN FTP 2.07
No auth needed
Prerequisites:
Network access to the target FTP server · Target running PCMAN FTP 2.07 on Windows XP SP3
exploitdb
WORKING POC
VERIFIED
by Mahmod Mahajna (Mahy) · pythonremotewindows
https://www.exploit-db.com/exploits/31255
This exploit targets a buffer overflow vulnerability in PCMAN FTP Server 2.07 via the CWD command. It sends a crafted payload containing a bind shell (port 4444) to achieve remote code execution.
Classification
Working Poc 95%
Target:
PCMAN FTP Server 2.07
Auth required
Prerequisites:
Network access to the FTP server · Valid FTP credentials
exploitdb
WORKING POC
VERIFIED
by Mahmod Mahajna (Mahy) · pythonremotewindows
https://www.exploit-db.com/exploits/31254
This exploit targets a buffer overflow vulnerability in PCMAN FTP Server 2.07 via the ABOR command. It sends a crafted payload containing a bind shell shellcode to achieve remote code execution.
Classification
Working Poc 95%
Target:
PCMAN FTP Server 2.07
Auth required
Prerequisites:
Network access to the target FTP server · Valid FTP credentials
exploitdb
WORKING POC
VERIFIED
by Polunchis · pythonremotewindows
https://www.exploit-db.com/exploits/27703
This exploit targets a buffer overflow vulnerability in PCMAN FTP 2.07 via a maliciously crafted STOR command. It delivers a shellcode payload to achieve remote code execution by leveraging a JMP ESP instruction in kernel32.dll.
Classification
Working Poc 95%
Target:
PCMAN FTP 2.07
Auth required
Prerequisites:
Network access to the target FTP server · Anonymous or valid FTP credentials
exploitdb
WORKING POC
VERIFIED
by Ottomatik · pythonremotewindows
https://www.exploit-db.com/exploits/27277
This exploit targets a buffer overflow vulnerability in PCMAN FTPD 2.07 via the PASS command. It sends a crafted payload with NOPs and shellcode to execute calc.exe, demonstrating remote code execution.
Classification
Working Poc 95%
Target:
PCMAN FTPD 2.07
No auth needed
Prerequisites:
Network access to the FTP service · FTP service running PCMAN FTPD 2.07
exploitdb
WORKING POC
VERIFIED
by MSJ · rubyremotewindows
https://www.exploit-db.com/exploits/27007
This exploit targets a buffer overflow in PCMan's FTPD v2.0.7 via the USER command, allowing remote code execution. It uses a standard stack-based overflow with a return address to achieve control flow hijacking.
Classification
Working Poc 95%
Target:
PCMan's FTPD v2.0.7
No auth needed
Prerequisites:
Network access to the FTP server · FTP server running PCMan's FTPD v2.0.7
exploitdb
WORKING POC
by R-73eN · pythonremotewindows
https://www.exploit-db.com/exploits/36078
This exploit targets a buffer overflow vulnerability in PCMan FTP Server v2.0.7 via the MKD command. It sends a crafted payload with a bind shell shellcode to achieve remote code execution.
Classification
Working Poc 95%
Target:
PCMan FTP Server v2.0.7
Auth required
Prerequisites:
Network access to the FTP server · FTP server running PCMan FTP Server v2.0.7 · Anonymous or valid credentials for authentication
exploitdb
WORKING POC
by Rick Flores · rubyremotewindows
https://www.exploit-db.com/exploits/28328
This Metasploit module exploits a stack-based buffer overflow in PCMAN FTP Server 2.07 via the STOR command with '/../' parameters. It delivers a payload to achieve remote code execution on Windows XP SP3 by overwriting the return address with a JMP ESP instruction.
Classification
Working Poc 100%
Target:
PCMAN FTP Server 2.07
Auth required
Prerequisites:
Network access to the FTP server · Valid FTP credentials
exploitdb
WORKING POC
by Chako · pythonremotewindows
https://www.exploit-db.com/exploits/26495
This exploit targets a buffer overflow vulnerability in PCMan's FTP Server 2.0. It sends a crafted payload with a JMP ESP address and shellcode to achieve remote code execution.
Classification
Working Poc 95%
Target:
PCMan's FTP Server 2.0
Auth required
Prerequisites:
Network access to the target FTP server · FTP server version 2.0 · Anonymous or valid credentials
nomisec
WORKING POC
2 stars
by t0rt3ll1n0 · poc
https://github.com/t0rt3ll1n0/PCmanBoF
This is a functional buffer overflow exploit for CVE-2013-4730 targeting PCman FTP Server 2.0.7, which overwrites the buffer and EIP to execute a reverse shell payload.
Classification
Working Poc 95%
Target:
PCman FTP Server 2.0.7
No auth needed
Prerequisites:
Network access to the target FTP server · PCman FTP Server 2.0.7 running on Windows XP SP3
metasploit
WORKING POC
NORMAL
by Christian (Polunchis) Ramirez, Rick (nanotechz9l) Flores · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/ftp/pcman_stor.rb
This Metasploit module exploits a stack-based buffer overflow in PCMAN FTP Server v2.07 via the STOR command with '/../' parameters, allowing remote code execution post-authentication. It uses a known return address (0x77c35459) and avoids bad characters to deliver a payload.
Classification
Working Poc 100%
Target:
PCMAN FTP Server v2.07
Auth required
Prerequisites:
Network access to the FTP server · Valid FTP credentials · Vulnerable PCMAN FTP Server version
metasploit
WORKING POC
NORMAL
by Jay Turla, Chris Higgins · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/ftp/pcman_put.rb
This Metasploit module exploits a buffer overflow vulnerability in PCMAN FTP Server v2.0.7 via the PUT command, allowing remote code execution. It includes a payload delivery mechanism and targets Windows XP SP3 English with a specific return address.
Classification
Working Poc 100%
Target:
PCMAN FTP Server v2.0.7
Auth required
Prerequisites:
Network access to the target FTP server · Valid credentials (anonymous by default)