CVE-2010-20121

EasyFTP Server versions up to 1.7.0.11 contain a stack-based buffer overflow vulnerability in the FTP command parser. When processing the CWD (Change Working Directory) command, the server fails to properly validate the length of the input string, allowing attackers to overwrite memory on the stack. This flaw enables remote code execution without authentication, as EasyFTP allows anonymous access by default. The vulnerability was resolved in version 1.7.0.12, after which the product was renamed “UplusFtp.”
Configurations

Configuration 1 (hide)

cpe:2.3:a:easyftp_server_project:easyftp_server:*:*:*:*:*:*:*:*

History

10 Sep 2025, 20:03

Type Values Removed Values Added
CPE cpe:2.3:a:easyftp_server_project:easyftp_server:*:*:*:*:*:*:*:*
References () https://paulmakowski.wordpress.com/2010/02/28/increasing-payload-size-w-return-address-overwrite/ - () https://paulmakowski.wordpress.com/2010/02/28/increasing-payload-size-w-return-address-overwrite/ - Exploit, Third Party Advisory
References () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/easyftp_cwd_fixret.rb - () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/easyftp_cwd_fixret.rb - Exploit
References () https://seclists.org/bugtraq/2010/Feb/202 - () https://seclists.org/bugtraq/2010/Feb/202 - Exploit, Mailing List, Third Party Advisory
References () https://www.exploit-db.com/exploits/11668 - () https://www.exploit-db.com/exploits/11668 - Exploit, VDB Entry
References () https://www.exploit-db.com/exploits/12312 - () https://www.exploit-db.com/exploits/12312 - Exploit, VDB Entry
References () https://www.exploit-db.com/exploits/14402 - () https://www.exploit-db.com/exploits/14402 - Exploit, VDB Entry
References () https://www.exploit-db.com/exploits/16737 - () https://www.exploit-db.com/exploits/16737 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/easyftp-server-cwd-command-stack-buffer-overflow - () https://www.vulncheck.com/advisories/easyftp-server-cwd-command-stack-buffer-overflow - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Easyftp Server Project
Easyftp Server Project easyftp Server

22 Aug 2025, 16:15

Type Values Removed Values Added
Summary
  • (es) Las versiones de EasyFTP Server hasta la 1.7.0.11 contienen una vulnerabilidad de desbordamiento de búfer en la pila del analizador de comandos FTP. Al procesar el comando CWD (Cambiar directorio de trabajo), el servidor no valida correctamente la longitud de la cadena de entrada, lo que permite a los atacantes sobrescribir la memoria en la pila. Esta falla permite la ejecución remota de código sin autenticación, ya que EasyFTP permite el acceso anónimo por defecto. La vulnerabilidad se resolvió en la versión 1.7.0.12, tras la cual el producto pasó a llamarse "UplusFtp".
References () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/easyftp_cwd_fixret.rb - () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/easyftp_cwd_fixret.rb -
References () https://seclists.org/bugtraq/2010/Feb/202 - () https://seclists.org/bugtraq/2010/Feb/202 -
References () https://www.exploit-db.com/exploits/11668 - () https://www.exploit-db.com/exploits/11668 -
References () https://www.exploit-db.com/exploits/12312 - () https://www.exploit-db.com/exploits/12312 -
References () https://www.exploit-db.com/exploits/14402 - () https://www.exploit-db.com/exploits/14402 -
References () https://www.exploit-db.com/exploits/16737 - () https://www.exploit-db.com/exploits/16737 -

21 Aug 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-21 20:15

Updated : 2025-09-10 20:03


NVD link : CVE-2010-20121

Mitre link : CVE-2010-20121

CVE.ORG link : CVE-2010-20121


JSON object : View

Products Affected

easyftp_server_project

  • easyftp_server
CWE
CWE-121

Stack-based Buffer Overflow