Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild

Posted on July 11, 2025July 11, 2025 By CWS

Jul 11, 2025Ravie LakshmananCyber Assault / Vulnerability
A lately disclosed maximum-severity safety flaw impacting the Wing FTP Server has come underneath energetic exploitation within the wild, based on Huntress.
The vulnerability, tracked as CVE-2025-47812 (CVSS rating: 10.0), is a case of improper dealing with of null (‘’) bytes within the server’s net interface, which permits for distant code execution. It has been addressed in model 7.4.4.
“The person and admin net interfaces mishandle ‘’ bytes, finally permitting injection of arbitrary Lua code into person session recordsdata,” based on an advisory for the flaw on CVE.org. “This can be utilized to execute arbitrary system instructions with the privileges of the FTP service (root or SYSTEM by default).”

What makes it much more regarding is that the flaw may be exploited by way of nameless FTP accounts. A complete breakdown of the vulnerability entered the general public area in direction of the tip of June 2025, courtesy of RCE Safety researcher Julien Ahrens.
Cybersecurity firm Huntress stated it noticed risk actors exploiting the flaw to obtain and execute malicious Lua recordsdata, conduct reconnaissance, and set up distant monitoring and administration software program.
“CVE-2025-47812 stems from how null bytes are dealt with within the username parameter (particularly associated to the loginok.html file, which handles the authentication course of),” Huntress researchers stated. “This will enable distant attackers to carry out Lua injection after utilizing the null byte within the username parameter.”

“By making the most of the null-byte injection, the adversary disrupts the anticipated enter within the Lua file which shops these session traits.”
Proof of energetic exploitation was first noticed in opposition to a single buyer on July 1, 2025, merely a day after particulars of the exploit had been disclosed. Upon gaining entry, the risk actors are stated to have run enumeration and reconnaissance instructions, created new customers as a type of persistence, and dropped Lua recordsdata to drop an installer for ScreenConnect.

There isn’t any proof that the distant desktop software program was truly put in, because the assault was detected and stopped earlier than it might progress any additional. It is presently not clear who’s behind the exercise.
Information from Censys reveals that there are 8,103 publicly-accessible units operating Wing FTP Server, out of which 5,004 have their net interface uncovered. The vast majority of the situations are positioned within the U.S., China, Germany, the U.Okay., and India.
In gentle of energetic exploitation, it is important that customers transfer rapidly to use the most recent patches and replace their Wing FTP Server variations of seven.4.4 or later.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Actively, Critical, CVE202547812, Exploited, FTP, Server, Vulnerability, Wild, Wing

Post navigation

Previous Post: Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
Next Post: Securing Data in the AI Era

Related Posts

Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploits The Hacker News
What Security Leaders Need to Know in 2025 The Hacker News
Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads The Hacker News
CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing The Hacker News
Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems The Hacker News
Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents
  • How to Understand GDPR and Data Rights
  • Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks
  • 28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild
  • PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents
  • How to Understand GDPR and Data Rights
  • Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks
  • 28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild
  • PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News