CVE-2025-47812

CRITICAL KEV NUCLEI

Wing FTP Server NULL-byte Authentication Bypass (CVE-2025-47812)

Title source: metasploit

Description

In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.

Exploits (24)

exploitdb WORKING POC
by 4m3rr0r · pythonremotemultiple
https://www.exploit-db.com/exploits/52347
nomisec WORKING POC 43 stars
by 4m3rr0r · remote
https://github.com/4m3rr0r/CVE-2025-47812-poc
nomisec WORKING POC 12 stars
by 0xcan1337 · remote
https://github.com/0xcan1337/CVE-2025-47812-poC
github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2025/CVE-2025-47812
github WRITEUP 7 stars
by cybersecplayground · poc
https://github.com/cybersecplayground/PoC-and-CVE-Reports/tree/main/2025/CVE-2025-47812.md
nomisec WORKING POC 3 stars
by 0xgh057r3c0n · remote
https://github.com/0xgh057r3c0n/CVE-2025-47812
github WORKING POC 2 stars
by shadowgit30 · pythonremote
https://github.com/shadowgit30/CVE-2025-47812
github WORKING POC 1 stars
by Nara-sakurai · pythonremote
https://github.com/Nara-sakurai/CVE-2025-47812-PoC
nomisec WORKING POC 1 stars
by r0otk3r · remote
https://github.com/r0otk3r/CVE-2025-47812
github SCANNER
by H3XploR · cpoc
https://github.com/H3XploR/Exploit_CVE-2025-47812
nomisec WRITEUP
by Majdae · poc
https://github.com/Majdae/CVE-2025-47812-Research
nomisec WORKING POC
by 0xjuarez · remote
https://github.com/0xjuarez/CVE-2025-47812
nomisec WORKING POC
by popyue · remote
https://github.com/popyue/CVE-2025-47812
nomisec WORKING POC
by estebanzarate · remote
https://github.com/estebanzarate/CVE-2025-47812-Wing-FTP-Server-7.4.3-Unauthenticated-RCE-PoC
nomisec WORKING POC
by havbay · poc
https://github.com/havbay/CVE-2025-47812-PoC
nomisec WORKING POC
by matesz44 · remote
https://github.com/matesz44/CVE-2025-47812
nomisec SCANNER
by rxerium · poc
https://github.com/rxerium/CVE-2025-47812
nomisec WORKING POC
by dkstar11q · poc
https://github.com/dkstar11q/Blackash-CVE-2025-47812
nomisec WORKING POC
by blindma1den · remote
https://github.com/blindma1den/CVE-2025-47812
nomisec WORKING POC
by pevinkumar10 · remote
https://github.com/pevinkumar10/CVE-2025-47812
nomisec WORKING POC
by ill-deed · remote
https://github.com/ill-deed/WingFTP-CVE-2025-47812-illdeed
metasploit WORKING POC EXCELLENT
by Valentin Lobstein, Julien Ahrens · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wingftp_null_byte_rce.rb
metasploit WORKING POC EXCELLENT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/ftp/wing_ftp_admin_exec.rb

Nuclei Templates (1)

Wing FTP Server <= 7.4.3 - Remote Code Execution
CRITICALVERIFIEDby rcesecurity,4m3rr0r
Shodan: http.html_hash:2121146066 || http.favicon.hash:963565804 || title:"Wing FTP Server" || Server: Wing FTP Server
FOFA: icon_hash="963565804" || title="Wing FTP Server" || Server: Wing FTP Server

Scores

CVSS v3 10.0
EPSS 0.9248
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Details

CISA KEV 2025-07-14
VulnCheck KEV 2025-07-10
ENISA EUVD EUVD-2025-21009
CWE
CWE-158
Status published
Products (1)
wftpserver/wing_ftp_server < 7.4.4
Published Jul 10, 2025
KEV Added Jul 14, 2025
Tracked Since Feb 18, 2026