CVE-2025-3725

7.3 HIGH

📋 TL;DR

A critical buffer overflow vulnerability exists in PCMan FTP Server 2.0.7's MIC command handler, allowing remote attackers to execute arbitrary code or crash the service. This affects anyone running the vulnerable FTP server version. The exploit is publicly available and can be launched remotely without authentication.

💻 Affected Systems

Products:
  • PCMan FTP Server
Versions: 2.0.7
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the MIC command handler component; any configuration using this server version is affected

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment

🟠

Likely Case

Service crash causing denial of service, with potential for RCE if exploit is refined

🟢

If Mitigated

Service disruption only if exploit attempts are blocked at network perimeter

🌐 Internet-Facing: HIGH - Remote unauthenticated exploit with public proof-of-concept available
🏢 Internal Only: MEDIUM - Still exploitable from internal networks but attack surface is reduced

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available at the provided references; buffer overflow can be triggered remotely

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found in provided references

Restart Required: Yes

Instructions:

1. Check for updated version from vendor. 2. If no patch available, consider alternative FTP server software. 3. Apply workarounds immediately.

🔧 Temporary Workarounds

Network Segmentation

all

Block FTP port 21 at network perimeter to prevent external exploitation

# Example firewall rule for Windows: netsh advfirewall firewall add rule name="Block FTP" dir=in action=block protocol=TCP localport=21
# Example for Linux: iptables -A INPUT -p tcp --dport 21 -j DROP

Disable MIC Command

windows

If server configuration allows, disable MIC command handler functionality

# Check server configuration files for MIC command settings
# Modify configuration to disable or restrict MIC command if possible

🧯 If You Can't Patch

  • Replace PCMan FTP Server with alternative secure FTP server software
  • Implement strict network access controls allowing only trusted IPs to connect

🔍 How to Verify

Check if Vulnerable:

Check PCMan FTP Server version: 1. Open server interface. 2. Navigate to Help > About. 3. Verify version is 2.0.7.

Check Version:

# Check running process: tasklist | findstr "ftpserver" or check installed programs in Control Panel

Verify Fix Applied:

Verify server is no longer version 2.0.7 or has been replaced with alternative software

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed connection attempts to FTP port 21
  • Unusual MIC command usage patterns
  • Server crash logs with buffer overflow indicators

Network Indicators:

  • Excessive traffic to FTP port 21 from untrusted sources
  • Patterns matching known exploit payloads in FTP traffic

SIEM Query:

source="ftp_logs" AND (message="*buffer overflow*" OR message="*MIC command*" OR message="*crash*")

🔗 References

📤 Share & Export