Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-47812
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
空字节或NULL字符转义处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Wing FTP Server 7.4.3及 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Wing FTP Server是Wing FTP Server开源的一套跨平台的FTP服务器软件。 Wing FTP Server 7.4.3版本及之前版本存在安全漏洞。攻击者利用该漏洞可以远程执行代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
wftpserverWing FTP Server 0 ~ 7.4.4 -
II. Public POCs for CVE-2025-47812
#POC DescriptionSource LinkShenlong Link
1Wing FTP Server versions prior to 7.4.4 are vulnerable to an unauthenticated remote code execution (RCE) flaw (CVE-2025-47812). The vulnerability arises from improper NULL byte handling in the 'username' parameter during login, which allows Lua code injection into session files. These injected session files are executed when accessing authenticated endpoints such as /dir.html, resulting in arbitrary command execution with elevated privileges. This attack is possible only when anonymous login is enabled on the server. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-47812.yamlPOC Details
2Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)https://github.com/4m3rr0r/CVE-2025-47812-pocPOC Details
3Simple exploit for Wing FTP Server RCE (CVE-2025-47812) to run commands and get a reverse shell. For educational use only.https://github.com/0xcan1337/CVE-2025-47812-poCPOC Details
4Wing FTP Server RCE via Lua Injectionhttps://github.com/0xgh057r3c0n/CVE-2025-47812POC Details
5Remote Command Execution exploit for Wing FTP Server (CVE-2025-47812)https://github.com/ill-deed/WingFTP-CVE-2025-47812-illdeedPOC Details
6Exploit for CVE-2025-47812 with custom psudo shell and robust error handling.https://github.com/pevinkumar10/CVE-2025-47812POC Details
7Detection for CVE-2025-47812https://github.com/rxerium/CVE-2025-47812POC Details
8Nonehttps://github.com/blindma1den/CVE-2025-47812POC Details
9CVE-2025-47812https://github.com/B1ack4sh/Blackash-CVE-2025-47812POC Details
10Nonehttps://github.com/r0otk3r/CVE-2025-47812POC Details
11Nonehttps://github.com/CTY-Research-1/CVE-2025-47812_Lab_environmentPOC Details
12Wing FTP Server RCE via Lua Injectionhttps://github.com/zr1p3r/CVE-2025-47812POC Details
13CVE-2025-47812https://github.com/Ashwesker/Blackash-CVE-2025-47812POC Details
14CVE-2025-47812https://github.com/Ashwesker/Ashwesker-CVE-2025-47812POC Details
15CVE-2025-47812https://github.com/dkstar11q/Blackash-CVE-2025-47812POC Details
16CVE-2025-47812: Wing FTP Server 7.4.3 UnauthN RCE in shhttps://github.com/matesz44/CVE-2025-47812POC Details
17CVE-2025-47812 POChttps://github.com/shadowgit30/CVE-2025-47812POC Details
18Nonehttps://github.com/Nara-sakurai/CVE-2025-47812-PoCPOC Details
19Unauthenticated remote code execution vulnerability in Wing FTP Server <= 7.4.3.https://github.com/estebanzarate/CVE-2025-47812-Wing-FTP-Server-7.4.3-Unauthenticated-RCE-PoCPOC Details
20RCE for WingFTP v4.7.3https://github.com/popyue/CVE-2025-47812POC Details
21Nonehttps://github.com/0xjuarez/CVE-2025-47812POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-47812
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-47812

No comments yet


Leave a comment