CVE-2025-4847

7.3 HIGH

📋 TL;DR

A critical buffer overflow vulnerability in FreeFloat FTP Server 1.0's MLS command handler allows remote attackers to execute arbitrary code or crash the service. This affects all deployments of FreeFloat FTP Server 1.0 with the MLS command enabled. Attackers can exploit this without authentication over the network.

💻 Affected Systems

Products:
  • FreeFloat FTP Server
Versions: 1.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: MLS command is typically enabled by default in FTP servers. All installations of FreeFloat FTP Server 1.0 are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Service crash causing denial of service, with potential for remote code execution if exploit is weaponized.

🟢

If Mitigated

Service disruption or crash, but no further compromise due to network segmentation and least privilege controls.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploit with public proof-of-concept available.
🏢 Internal Only: HIGH - Buffer overflow can be exploited from any network segment where the service is accessible.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available, making weaponization straightforward. The buffer overflow in MLS command handler requires minimal attacker skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: N/A

Restart Required: No

Instructions:

No official patch available. FreeFloat FTP Server appears to be abandoned software. Migrate to a supported FTP server solution.

🔧 Temporary Workarounds

Disable MLS command

windows

Disable the vulnerable MLS command in FreeFloat FTP Server configuration

Edit configuration file to remove or disable MLS command support

Network segmentation

all

Restrict access to FTP server to only trusted networks

Configure firewall rules to allow FTP (port 21) only from required IP ranges

🧯 If You Can't Patch

  • Replace FreeFloat FTP Server with a maintained alternative like FileZilla Server, vsftpd, or ProFTPD
  • Implement strict network access controls and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if FreeFloat FTP Server 1.0 is installed and running. Verify MLS command is enabled in configuration.

Check Version:

Check FreeFloat FTP Server interface or configuration files for version information

Verify Fix Applied:

Verify FreeFloat FTP Server has been removed or replaced with alternative software. Test that MLS command is no longer available.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed MLS command attempts
  • Unusual buffer overflow patterns in FTP logs
  • Service crash/restart events

Network Indicators:

  • Excessive or malformed MLS commands to FTP port 21
  • Buffer overflow patterns in FTP traffic

SIEM Query:

source="ftp.log" AND (command="MLS" OR "buffer overflow" OR "access violation")

🔗 References

📤 Share & Export