CVE-2025-4181

A vulnerability was found in PCMan FTP Server 2.0.7. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component SEND Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pcman:ftp_server:2.0.7:*:*:*:*:*:*:*

History

13 May 2025, 20:27

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en PCMan FTP Server 2.0.7. Se ha declarado crítica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente SEND Command Handler. La manipulación provoca un desbordamiento del búfer. El ataque puede ejecutarse remotamente. Se ha hecho público el exploit y puede que sea utilizado.
References () https://fitoxs.com/exploit/exploit-202cb962ac59075b964b07152d234b70.txt - () https://fitoxs.com/exploit/exploit-202cb962ac59075b964b07152d234b70.txt - Exploit
References () https://vuldb.com/?ctiid.306799 - () https://vuldb.com/?ctiid.306799 - Permissions Required
References () https://vuldb.com/?id.306799 - () https://vuldb.com/?id.306799 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.561139 - () https://vuldb.com/?submit.561139 - Exploit, Third Party Advisory, VDB Entry
CPE cpe:2.3:a:pcman:ftp_server:2.0.7:*:*:*:*:*:*:*
First Time Pcman ftp Server
Pcman

02 May 2025, 18:15

Type Values Removed Values Added
References () https://fitoxs.com/exploit/exploit-202cb962ac59075b964b07152d234b70.txt - () https://fitoxs.com/exploit/exploit-202cb962ac59075b964b07152d234b70.txt -

01 May 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 23:15

Updated : 2025-05-13 20:27


NVD link : CVE-2025-4181

Mitre link : CVE-2025-4181

CVE.ORG link : CVE-2025-4181


JSON object : View

Products Affected

pcman

  • ftp_server
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')