This exploit targets PeerFTP Server <=v4.01 by sending a malformed RETR command with an oversized buffer (1000 'X' characters) to trigger a remote crash. It requires authentication but uses default anonymous credentials if none are provided.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:PeerFTP Server <=v4.01
Auth required
Prerequisites:Network access to the target FTP server · Valid or anonymous credentials