CVE-2025-5111

A vulnerability, which was classified as critical, has been found in FreeFloat FTP Server 1.0. Affected by this issue is some unknown functionality of the component TYPE Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*

History

23 Jun 2025, 14:51

Type Values Removed Values Added
References () https://fitoxs.com/exploit/exploit-b08607fc683b518b37423881e5ee902fdb2a7c04ac57f7ff725df240e171f5e3.txt - () https://fitoxs.com/exploit/exploit-b08607fc683b518b37423881e5ee902fdb2a7c04ac57f7ff725df240e171f5e3.txt - Exploit
References () https://vuldb.com/?ctiid.310088 - () https://vuldb.com/?ctiid.310088 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.310088 - () https://vuldb.com/?id.310088 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.582958 - () https://vuldb.com/?submit.582958 - Third Party Advisory, VDB Entry
First Time Freefloat freefloat Ftp Server
Freefloat
CPE cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*
Summary
  • (es) Se ha detectado una vulnerabilidad clasificada como crítica en FreeFloat FTP Server 1.0. Este problema afecta a una funcionalidad desconocida del componente TYPE Command Handler. La manipulación provoca un desbordamiento del búfer. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.

23 May 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-23 14:15

Updated : 2025-06-23 14:51


NVD link : CVE-2025-5111

Mitre link : CVE-2025-5111

CVE.ORG link : CVE-2025-5111


JSON object : View

Products Affected

freefloat

  • freefloat_ftp_server
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')