CVE-2025-3725

A vulnerability was found in PCMan FTP Server 2.0.7. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component MIC Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pcman:ftp_server:2.0.7:*:*:*:*:*:*:*

History

12 May 2025, 20:40

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en PCMan FTP Server 2.0.7. Se ha declarado crítica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente MIC Command Handler. La manipulación provoca un desbordamiento del búfer. El ataque puede ejecutarse remotamente. Se ha hecho público el exploit y puede que sea utilizado.
First Time Pcman ftp Server
Pcman
References () https://fitoxs.com/exploit/exploit-827ccb0eea8a706c4c34a16891f84e7b.txt - () https://fitoxs.com/exploit/exploit-827ccb0eea8a706c4c34a16891f84e7b.txt - Exploit
References () https://vuldb.com/?ctiid.305071 - () https://vuldb.com/?ctiid.305071 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.305071 - () https://vuldb.com/?id.305071 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.552814 - () https://vuldb.com/?submit.552814 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:pcman:ftp_server:2.0.7:*:*:*:*:*:*:*

17 Apr 2025, 14:15

Type Values Removed Values Added
References () https://fitoxs.com/exploit/exploit-827ccb0eea8a706c4c34a16891f84e7b.txt - () https://fitoxs.com/exploit/exploit-827ccb0eea8a706c4c34a16891f84e7b.txt -

16 Apr 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-16 20:15

Updated : 2025-05-12 20:40


NVD link : CVE-2025-3725

Mitre link : CVE-2025-3725

CVE.ORG link : CVE-2025-3725


JSON object : View

Products Affected

pcman

  • ftp_server
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')