CVE-2025-5594

| EUVD-2025-16895 HIGH
2025-06-04 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 17:29 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:29 euvd
EUVD-2025-16895
PoC Detected
Jun 13, 2025 - 00:58 vuln.today
Public exploit code
CVE Published
Jun 04, 2025 - 16:15 nvd
HIGH 7.3

Description

A vulnerability has been found in FreeFloat FTP Server 1.0 and classified as critical. This vulnerability affects unknown code of the component SET Command Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

Critical buffer overflow vulnerability in the SET Command Handler of FreeFloat FTP Server 1.0 that allows unauthenticated remote attackers to trigger memory corruption with potential for code execution or service disruption. The vulnerability has been publicly disclosed with exploit code available, increasing immediate risk of active exploitation in the wild. With a CVSS score of 7.3 and network-accessible attack vector requiring no privileges or user interaction, this represents a significant threat to any FTP infrastructure running the affected version.

Technical Context

FreeFloat FTP Server 1.0 contains an input validation flaw in its SET command handler component, which fails to properly bounds-check user-supplied data before writing to a fixed-size buffer. This is a classic stack-based or heap-based buffer overflow (CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer), a memory safety violation that allows attackers to overwrite adjacent memory regions. The FTP protocol's command-based architecture means the SET command is directly accessible over the network without prior authentication, making this trivially reachable. The vulnerability likely resides in the command parsing logic where the handler processes arguments without adequate length validation before copying them into an internal buffer.

Affected Products

FreeFloat FTP Server (['1.0'])

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +36
POC: +20

Share

CVE-2025-5594 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy