This exploit demonstrates a buffer overflow in FTPShell Client v5.24 by overwriting the EIP register and redirecting execution to shellcode in the ECX register, achieving local arbitrary code execution (e.g., launching calc.exe). The payload is crafted to bypass basic protections and directly control program flow.
Classification
Working Poc 95%
Target:
FTPShell Client v5.24
No auth needed
Prerequisites:
Local access to the FTPShell Client application · Ability to inject payload into the 'Address' field