CVE-2025-5551

| EUVD-2025-16803 HIGH
2025-06-04 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 17:29 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:29 euvd
EUVD-2025-16803
PoC Detected
Jun 24, 2025 - 15:21 vuln.today
Public exploit code
CVE Published
Jun 04, 2025 - 02:15 nvd
HIGH 7.3

Description

A vulnerability was found in FreeFloat FTP Server 1.0. It has been classified as critical. This affects an unknown part of the component SYSTEM Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Analysis

Critical buffer overflow vulnerability in FreeFloat FTP Server 1.0's SYSTEM Command Handler that allows unauthenticated remote attackers to achieve information disclosure, integrity violation, and service disruption. The vulnerability has been publicly disclosed with exploit code available, making it actively exploitable in real-world environments without requiring user interaction or elevated privileges.

Technical Context

The vulnerability exists in the SYSTEM Command Handler component of FreeFloat FTP Server 1.0 (CPE: cpe:2.3:a:freefloat:ftp_server:1.0:*:*:*:*:*:*:*). The root cause is CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), a classic buffer overflow condition where user-supplied input to FTP protocol commands is not properly validated before being written to a fixed-size buffer. FTP servers implement command handlers that parse and execute client directives; the SYSTEM command handler specifically appears to lack input length validation, allowing an attacker to overflow the buffer with crafted FTP commands and execute arbitrary code or corrupt memory structures.

Affected Products

- product: FreeFloat FTP Server; versions: ['1.0']; cpe: cpe:2.3:a:freefloat:ftp_server:1.0:*:*:*:*:*:*:*; component: SYSTEM Command Handler; vulnerability_type: Buffer Overflow

Remediation

Immediate remediation steps: (1) Upgrade FreeFloat FTP Server to a patched version (vendor patch release information not provided in available data—contact FreeFloat/Unimative for patch availability); (2) If patching is not immediately possible, implement network-level mitigations: restrict FTP access via firewall ACLs to authorized IP ranges only, disable the SYSTEM command handler if possible through configuration, or disable the FTP service entirely if not critical; (3) Monitor FTP server logs for unusual SYSTEM command patterns or oversized input payloads; (4) Consider replacing FreeFloat FTP Server with modern maintained alternatives (vsftpd, ProFTPD, Pure-FTPd) that receive security updates; (5) Segment the FTP server on an isolated network with limited lateral movement capabilities.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +36
POC: +20

Share

CVE-2025-5551 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy