Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild

Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild

Posted on July 11, 2025July 11, 2025 By CWS

Jul 11, 2025Ravie LakshmananCyber Assault / Vulnerability
A lately disclosed maximum-severity safety flaw impacting the Wing FTP Server has come underneath energetic exploitation within the wild, based on Huntress.
The vulnerability, tracked as CVE-2025-47812 (CVSS rating: 10.0), is a case of improper dealing with of null (‘’) bytes within the server’s net interface, which permits for distant code execution. It has been addressed in model 7.4.4.
“The person and admin net interfaces mishandle ‘’ bytes, finally permitting injection of arbitrary Lua code into person session recordsdata,” based on an advisory for the flaw on CVE.org. “This can be utilized to execute arbitrary system instructions with the privileges of the FTP service (root or SYSTEM by default).”

What makes it much more regarding is that the flaw may be exploited by way of nameless FTP accounts. A complete breakdown of the vulnerability entered the general public area in direction of the tip of June 2025, courtesy of RCE Safety researcher Julien Ahrens.
Cybersecurity firm Huntress stated it noticed risk actors exploiting the flaw to obtain and execute malicious Lua recordsdata, conduct reconnaissance, and set up distant monitoring and administration software program.
“CVE-2025-47812 stems from how null bytes are dealt with within the username parameter (particularly associated to the loginok.html file, which handles the authentication course of),” Huntress researchers stated. “This will enable distant attackers to carry out Lua injection after utilizing the null byte within the username parameter.”

“By making the most of the null-byte injection, the adversary disrupts the anticipated enter within the Lua file which shops these session traits.”
Proof of energetic exploitation was first noticed in opposition to a single buyer on July 1, 2025, merely a day after particulars of the exploit had been disclosed. Upon gaining entry, the risk actors are stated to have run enumeration and reconnaissance instructions, created new customers as a type of persistence, and dropped Lua recordsdata to drop an installer for ScreenConnect.

There isn’t any proof that the distant desktop software program was truly put in, because the assault was detected and stopped earlier than it might progress any additional. It is presently not clear who’s behind the exercise.
Information from Censys reveals that there are 8,103 publicly-accessible units operating Wing FTP Server, out of which 5,004 have their net interface uncovered. The vast majority of the situations are positioned within the U.S., China, Germany, the U.Okay., and India.
In gentle of energetic exploitation, it is important that customers transfer rapidly to use the most recent patches and replace their Wing FTP Server variations of seven.4.4 or later.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Actively, Critical, CVE202547812, Exploited, FTP, Server, Vulnerability, Wild, Wing

Post navigation

Previous Post: New eSIM Hack Let Attackers Clone Profiles and Hijack Phone Identities
Next Post: Securing Data in the AI Era

Related Posts

New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Code New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Code The Hacker News
AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe The Hacker News
Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits The Hacker News
Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns The Hacker News
Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms The Hacker News
Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News