This is a writeup describing a local Denial of Service (DoS) vulnerability in FreshFTP 5.52. The exploit involves creating a malformed .QFL file with an oversized payload, causing high CPU and RAM usage when parsed by the application.
Classification
Writeup 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:FreshFTP 5.52
No auth needed
Prerequisites:Access to the system where FreshFTP is installed · Ability to create a malformed .QFL file in the FreshFTP directory