Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild

Posted on July 11, 2025July 11, 2025 By CWS

Jul 11, 2025Ravie LakshmananCyber Assault / Vulnerability
A lately disclosed maximum-severity safety flaw impacting the Wing FTP Server has come underneath energetic exploitation within the wild, based on Huntress.
The vulnerability, tracked as CVE-2025-47812 (CVSS rating: 10.0), is a case of improper dealing with of null (‘’) bytes within the server’s net interface, which permits for distant code execution. It has been addressed in model 7.4.4.
“The person and admin net interfaces mishandle ‘’ bytes, finally permitting injection of arbitrary Lua code into person session recordsdata,” based on an advisory for the flaw on CVE.org. “This can be utilized to execute arbitrary system instructions with the privileges of the FTP service (root or SYSTEM by default).”

What makes it much more regarding is that the flaw may be exploited by way of nameless FTP accounts. A complete breakdown of the vulnerability entered the general public area in direction of the tip of June 2025, courtesy of RCE Safety researcher Julien Ahrens.
Cybersecurity firm Huntress stated it noticed risk actors exploiting the flaw to obtain and execute malicious Lua recordsdata, conduct reconnaissance, and set up distant monitoring and administration software program.
“CVE-2025-47812 stems from how null bytes are dealt with within the username parameter (particularly associated to the loginok.html file, which handles the authentication course of),” Huntress researchers stated. “This will enable distant attackers to carry out Lua injection after utilizing the null byte within the username parameter.”

“By making the most of the null-byte injection, the adversary disrupts the anticipated enter within the Lua file which shops these session traits.”
Proof of energetic exploitation was first noticed in opposition to a single buyer on July 1, 2025, merely a day after particulars of the exploit had been disclosed. Upon gaining entry, the risk actors are stated to have run enumeration and reconnaissance instructions, created new customers as a type of persistence, and dropped Lua recordsdata to drop an installer for ScreenConnect.

There isn’t any proof that the distant desktop software program was truly put in, because the assault was detected and stopped earlier than it might progress any additional. It is presently not clear who’s behind the exercise.
Information from Censys reveals that there are 8,103 publicly-accessible units operating Wing FTP Server, out of which 5,004 have their net interface uncovered. The vast majority of the situations are positioned within the U.S., China, Germany, the U.Okay., and India.
In gentle of energetic exploitation, it is important that customers transfer rapidly to use the most recent patches and replace their Wing FTP Server variations of seven.4.4 or later.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Actively, Critical, CVE202547812, Exploited, FTP, Server, Vulnerability, Wild, Wing

Post navigation

Previous Post: Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
Next Post: Securing Data in the AI Era

Related Posts

WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately The Hacker News
Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts The Hacker News
Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages The Hacker News
38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases The Hacker News
North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign The Hacker News
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors
  • New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression
  • ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots
  • Spotify Launches Direct Message Feature for Music Sharing, What are the Risks Associated?
  • New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors
  • New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression
  • ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots
  • Spotify Launches Direct Message Feature for Music Sharing, What are the Risks Associated?
  • New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News