Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| wftpserver | Wing FTP Server | 0 ~ 7.4.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Wing FTP Server versions prior to 7.4.4 are vulnerable to an unauthenticated remote code execution (RCE) flaw (CVE-2025-47812). The vulnerability arises from improper NULL byte handling in the 'username' parameter during login, which allows Lua code injection into session files. These injected session files are executed when accessing authenticated endpoints such as /dir.html, resulting in arbitrary command execution with elevated privileges. This attack is possible only when anonymous login is enabled on the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-47812.yaml | POC Details |
| 2 | Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812) | https://github.com/4m3rr0r/CVE-2025-47812-poc | POC Details |
| 3 | Simple exploit for Wing FTP Server RCE (CVE-2025-47812) to run commands and get a reverse shell. For educational use only. | https://github.com/0xcan1337/CVE-2025-47812-poC | POC Details |
| 4 | Wing FTP Server RCE via Lua Injection | https://github.com/0xgh057r3c0n/CVE-2025-47812 | POC Details |
| 5 | Remote Command Execution exploit for Wing FTP Server (CVE-2025-47812) | https://github.com/ill-deed/WingFTP-CVE-2025-47812-illdeed | POC Details |
| 6 | Exploit for CVE-2025-47812 with custom psudo shell and robust error handling. | https://github.com/pevinkumar10/CVE-2025-47812 | POC Details |
| 7 | Detection for CVE-2025-47812 | https://github.com/rxerium/CVE-2025-47812 | POC Details |
| 8 | None | https://github.com/blindma1den/CVE-2025-47812 | POC Details |
| 9 | CVE-2025-47812 | https://github.com/B1ack4sh/Blackash-CVE-2025-47812 | POC Details |
| 10 | None | https://github.com/r0otk3r/CVE-2025-47812 | POC Details |
| 11 | None | https://github.com/CTY-Research-1/CVE-2025-47812_Lab_environment | POC Details |
| 12 | Wing FTP Server RCE via Lua Injection | https://github.com/zr1p3r/CVE-2025-47812 | POC Details |
| 13 | CVE-2025-47812 | https://github.com/Ashwesker/Blackash-CVE-2025-47812 | POC Details |
| 14 | CVE-2025-47812 | https://github.com/Ashwesker/Ashwesker-CVE-2025-47812 | POC Details |
| 15 | CVE-2025-47812 | https://github.com/dkstar11q/Blackash-CVE-2025-47812 | POC Details |
| 16 | CVE-2025-47812: Wing FTP Server 7.4.3 UnauthN RCE in sh | https://github.com/matesz44/CVE-2025-47812 | POC Details |
| 17 | CVE-2025-47812 POC | https://github.com/shadowgit30/CVE-2025-47812 | POC Details |
| 18 | None | https://github.com/Nara-sakurai/CVE-2025-47812-PoC | POC Details |
| 19 | Unauthenticated remote code execution vulnerability in Wing FTP Server <= 7.4.3. | https://github.com/estebanzarate/CVE-2025-47812-Wing-FTP-Server-7.4.3-Unauthenticated-RCE-PoC | POC Details |
| 20 | RCE for WingFTP v4.7.3 | https://github.com/popyue/CVE-2025-47812 | POC Details |
| 21 | None | https://github.com/0xjuarez/CVE-2025-47812 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet