CVE-2014-125114

HIGH

i-Ftp <2.20 - Buffer Overflow

Title source: llm

Description

A stack-based buffer overflow vulnerability exists in i-Ftp version 2.20 due to improper handling of the Time attribute within Schedule.xml. By placing a specially crafted Schedule.xml file in the i-Ftp application directory, a remote attacker can trigger a buffer overflow during scheduled download parsing, potentially leading to arbitrary code execution or a crash.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/35671
exploitdb WORKING POC VERIFIED
by metacom · pythonlocalwindows
https://www.exploit-db.com/exploits/35177
metasploit WORKING POC NORMAL
by metacom, Gabor Seljan · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/iftp_schedule_bof.rb

Scores

CVSS v4 8.4
EPSS 0.2279
EPSS Percentile 95.9%
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Details

CWE
CWE-121 CWE-20
Status published
Products (1)
i-Ftp/i-Ftp 2.20
Published Jul 25, 2025
Tracked Since Feb 18, 2026