Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Wing FTP Server Vulnerability Exploited

Posted on July 11, 2025July 11, 2025 By CWS

Hackers have been exploiting a critical-severity vulnerability within the Wing FTP Server file switch answer to execute arbitrary code remotely, after technical info on the flaw was printed on June 30, safety researchers warn.

Tracked as CVE-2025-47812, the vital challenge is described because the mishandling of null bytes, which permits attackers to inject arbitrary Lua code in consumer session information, resulting in the execution of arbitrary instructions with root or system privileges.

Profitable exploitation of the bug may doubtlessly result in full server compromise by means of the distant execution of arbitrary code. Whereas authentication is required, menace actors can even exploit the defect utilizing an nameless FTP account, which doesn’t require a password however is disabled by default.

“When exploiting the vulnerability, a particular set of characters is inserted into the username, bypassing string processing throughout login. This flaw permits menace actors to inject arbitrary Lua code into the applying, which is executed upon visiting particular pages,” Arctic Wolf explains.

CVE-2025-47812 impacts Wing FTP Server iterations as much as model 7.4.3, and was resolved in model 7.4.4 of the file switch device, which was launched on Might 14.

On June 30, nevertheless, Julien Ahrens of RCE Safety printed technical info and a PoC exploit for the vulnerability, and hackers began focusing on it within the wild the subsequent day, Huntress reviews.

“[Wing FTP] periods usually retailer the consumer’s present listing, IP handle, and username. By making the most of the null-byte injection, the adversary disrupts the anticipated enter within the Lua file which shops these session traits,” the safety agency notes.

Huntress, which additionally created a PoC exploit focusing on the flaw, says indicators of compromise (IoCs) could be discovered within the Wing FTP set up folder, in logs inside the ‘Area’ listing.Commercial. Scroll to proceed studying.

The safety agency says it has noticed menace exercise in opposition to a single buyer as of July 8, with the attackers making an attempt to fetch and run arbitrary information, fingerprint the system, and deploy instruments for distant entry.

In keeping with Censys, nevertheless, there are roughly 8,103 internet-accessible Wing FTP Servers, with 5,004 of them exposing their net interfaces. They’re doubtlessly vulnerable to exploitation, because the PoC exploit for CVE-2025-47812 makes use of a POST request.

Associated: Grafana Patches Chromium Bugs, Together with Zero-Day Exploited within the Wild

Associated: CISA Warns of Two Exploited TeleMessage Vulnerabilities

Associated: Hundreds of Citrix NetScaler Cases Unpatched In opposition to Exploited Vulnerabilities

Associated: Vital Citrix NetScaler Flaw Exploited as Zero-Day

Security Week News Tags:Critical, Exploited, FTP, Server, Vulnerability, Wing

Post navigation

Previous Post: TikTok Faces Fresh European Privacy Investigation Over China Data Transfers
Next Post: Russian Basketball Player Arrested over Alleged Ransomware Attack Claims

Related Posts

Creating Realistic Deepfakes Is Getting Easier Than Ever. Fighting Back May Take Even More AI Security Week News
US Seeks Forfeiture of $7.74M in Cryptocurrency Tied to North Korean IT Workers Security Week News
GreyNoise Flags 9,000 ASUS Routers Backdoored Via Patched Vulnerability Security Week News
Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape Security Week News
CISA Warns AMI BMC Vulnerability Exploited in the Wild Security Week News
480,000 Catholic Health Patients Impacted by Serviceaide Data Leak Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell
  • Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data
  • DOGE Accused of Creating Live Copy of the Country’s Social Security Information in Unsecured Cloud Environment
  • Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra
  • Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell
  • Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data
  • DOGE Accused of Creating Live Copy of the Country’s Social Security Information in Unsecured Cloud Environment
  • Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra
  • Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News