CVE-2014-125114
HIGHi-Ftp <2.20 - Buffer Overflow
Title source: llmDescription
A stack-based buffer overflow vulnerability exists in i-Ftp version 2.20 due to improper handling of the Time attribute within Schedule.xml. By placing a specially crafted Schedule.xml file in the i-Ftp application directory, a remote attacker can trigger a buffer overflow during scheduled download parsing, potentially leading to arbitrary code execution or a crash.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/35671
exploitdb
WORKING POC
VERIFIED
by metacom · pythonlocalwindows
https://www.exploit-db.com/exploits/35177
metasploit
WORKING POC
NORMAL
by metacom, Gabor Seljan · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/iftp_schedule_bof.rb
References (4)
Scores
CVSS v4
8.4
EPSS
0.2279
EPSS Percentile
95.9%
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Details
CWE
CWE-121
CWE-20
Status
published
Products (1)
i-Ftp/i-Ftp
2.20
Published
Jul 25, 2025
Tracked Since
Feb 18, 2026