CVE-2025-47812

10.0 CRITICAL CISA KEV

📋 TL;DR

CVE-2025-47812 is a critical remote code execution vulnerability in Wing FTP Server that allows attackers to inject arbitrary Lua code via null byte handling flaws in web interfaces. This enables execution of system commands with FTP service privileges (typically root/SYSTEM), leading to complete server compromise. All Wing FTP Server installations before version 7.4.4 are affected, including those using anonymous FTP accounts.

💻 Affected Systems

Products:
  • Wing FTP Server
Versions: All versions before 7.4.4
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable in default configuration, exploitable via both authenticated and anonymous FTP accounts.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with root/SYSTEM privileges, data theft, ransomware deployment, and lateral movement within the network.

🟠

Likely Case

Remote code execution leading to server compromise, data exfiltration, and potential deployment of malware or backdoors.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and monitoring are in place, though exploitation would still grant FTP service privileges.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward with public proof-of-concept code available. CISA has added this to its Known Exploited Vulnerabilities catalog.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.4.4

Vendor Advisory: https://www.wftpserver.com

Restart Required: Yes

Instructions:

1. Download Wing FTP Server version 7.4.4 or later from the official website. 2. Stop the FTP service. 3. Install the updated version. 4. Restart the FTP service.

🔧 Temporary Workarounds

Disable Anonymous FTP Access

all

Prevents exploitation via anonymous accounts by disabling anonymous FTP functionality.

Edit Wing FTP Server configuration to set 'AllowAnonymous=0' in the server settings

Network Access Control

all

Restrict access to Wing FTP Server web interfaces to trusted IP addresses only.

Configure firewall rules to allow only specific IPs to access FTP server ports (typically 21, 80, 443, 5466)

🧯 If You Can't Patch

  • Isolate the FTP server in a segmented network zone with strict egress filtering
  • Implement application allowlisting to prevent execution of unauthorized binaries

🔍 How to Verify

Check if Vulnerable:

Check Wing FTP Server version in admin interface or via 'wingftpserver --version' command. If version is below 7.4.4, the system is vulnerable.

Check Version:

wingftpserver --version

Verify Fix Applied:

Confirm version is 7.4.4 or higher using the same version check method.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Lua code execution in session files
  • Suspicious FTP commands containing null bytes or Lua patterns
  • Unexpected process execution from FTP service account

Network Indicators:

  • HTTP/FTP requests containing '%00' or null byte sequences
  • Unusual outbound connections from FTP server

SIEM Query:

source="wingftp" AND (message="*%00*" OR message="*lua*" OR process="*cmd*" OR process="*powershell*")

🔗 References

📤 Share & Export