CVE-2025-4160
📋 TL;DR
A critical buffer overflow vulnerability exists in PCMan FTP Server's LS command handler, allowing remote attackers to execute arbitrary code or crash the service. This affects all versions up to 2.0.7. Attackers can exploit this without authentication over the network.
💻 Affected Systems
- PCMan FTP Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or ransomware deployment.
Likely Case
Service crash causing denial of service, with potential for remote code execution by skilled attackers.
If Mitigated
Limited to denial of service if exploit attempts are blocked or memory protections are enabled.
🎯 Exploit Status
Public exploit code is available, making exploitation straightforward for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch exists. Consider migrating to alternative FTP server software.
🔧 Temporary Workarounds
Disable FTP Service
windowsCompletely disable PCMan FTP Server if not required.
net stop "PCMan FTP Server"
sc config "PCMan FTP Server" start= disabled
Network Segmentation
windowsRestrict access to FTP port (default 21) using firewall rules.
netsh advfirewall firewall add rule name="Block PCMan FTP" dir=in action=block protocol=TCP localport=21
🧯 If You Can't Patch
- Replace PCMan FTP Server with alternative secure FTP software like FileZilla Server or vsftpd.
- Implement network monitoring and intrusion detection for FTP traffic anomalies.
🔍 How to Verify
Check if Vulnerable:
Check PCMan FTP Server version in GUI or via installed programs list. Versions ≤2.0.7 are vulnerable.
Check Version:
Check Control Panel > Programs and Features for PCMan FTP Server version.
Verify Fix Applied:
Verify service is stopped or uninstalled, or that alternative FTP software is running.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed LS command attempts
- Unusual buffer overflow errors in FTP logs
- Service crash events in Windows Event Log
Network Indicators:
- Excessive or malformed LS commands to FTP port 21
- Buffer overflow patterns in FTP traffic
SIEM Query:
source="ftp.log" AND (command="LS" OR command="LIST") AND size>1000