Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild

Posted on July 11, 2025July 11, 2025 By CWS

Jul 11, 2025Ravie LakshmananCyber Assault / Vulnerability
A lately disclosed maximum-severity safety flaw impacting the Wing FTP Server has come underneath energetic exploitation within the wild, based on Huntress.
The vulnerability, tracked as CVE-2025-47812 (CVSS rating: 10.0), is a case of improper dealing with of null (‘’) bytes within the server’s net interface, which permits for distant code execution. It has been addressed in model 7.4.4.
“The person and admin net interfaces mishandle ‘’ bytes, finally permitting injection of arbitrary Lua code into person session recordsdata,” based on an advisory for the flaw on CVE.org. “This can be utilized to execute arbitrary system instructions with the privileges of the FTP service (root or SYSTEM by default).”

What makes it much more regarding is that the flaw may be exploited by way of nameless FTP accounts. A complete breakdown of the vulnerability entered the general public area in direction of the tip of June 2025, courtesy of RCE Safety researcher Julien Ahrens.
Cybersecurity firm Huntress stated it noticed risk actors exploiting the flaw to obtain and execute malicious Lua recordsdata, conduct reconnaissance, and set up distant monitoring and administration software program.
“CVE-2025-47812 stems from how null bytes are dealt with within the username parameter (particularly associated to the loginok.html file, which handles the authentication course of),” Huntress researchers stated. “This will enable distant attackers to carry out Lua injection after utilizing the null byte within the username parameter.”

“By making the most of the null-byte injection, the adversary disrupts the anticipated enter within the Lua file which shops these session traits.”
Proof of energetic exploitation was first noticed in opposition to a single buyer on July 1, 2025, merely a day after particulars of the exploit had been disclosed. Upon gaining entry, the risk actors are stated to have run enumeration and reconnaissance instructions, created new customers as a type of persistence, and dropped Lua recordsdata to drop an installer for ScreenConnect.

There isn’t any proof that the distant desktop software program was truly put in, because the assault was detected and stopped earlier than it might progress any additional. It is presently not clear who’s behind the exercise.
Information from Censys reveals that there are 8,103 publicly-accessible units operating Wing FTP Server, out of which 5,004 have their net interface uncovered. The vast majority of the situations are positioned within the U.S., China, Germany, the U.Okay., and India.
In gentle of energetic exploitation, it is important that customers transfer rapidly to use the most recent patches and replace their Wing FTP Server variations of seven.4.4 or later.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Actively, Critical, CVE202547812, Exploited, FTP, Server, Vulnerability, Wild, Wing

Post navigation

Previous Post: New eSIM Hack Let Attackers Clone Profiles and Hijack Phone Identities
Next Post: Securing Data in the AI Era

Related Posts

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs The Hacker News
Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems The Hacker News
XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks The Hacker News
6 Browser-Based Attacks Security Teams Need to Prepare For Right Now The Hacker News
The Silent Drivers Behind 2025’s Worst Breaches The Hacker News
UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark