This exploit triggers a remote denial-of-service (DoS) in WFTPD 3.3 by sending a malformed 'REST' command with an excessively large integer, followed by a 'RETR' command. The exploit requires valid FTP credentials and an existing file on the server.
Classification
Working Poc 95%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:WFTPD 3.3
Auth required
Prerequisites:Valid FTP credentials · Existing file on the server