CVE-2025-5596

| EUVD-2025-16898 HIGH
2025-06-04 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 17:29 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:29 euvd
EUVD-2025-16898
PoC Detected
Jun 24, 2025 - 15:21 vuln.today
Public exploit code
CVE Published
Jun 04, 2025 - 17:15 nvd
HIGH 7.3

Description

A vulnerability was found in FreeFloat FTP Server 1.0. It has been classified as critical. Affected is an unknown function of the component REGET Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Analysis

Critical buffer overflow vulnerability in FreeFloat FTP Server 1.0 affecting the REGET command handler, allowing unauthenticated remote attackers to achieve code execution or denial of service. The vulnerability has been publicly disclosed with proof-of-concept code available, and while CVSS 7.3 indicates moderate-to-high severity, the network-accessible attack vector (AV:N), lack of authentication requirements (PR:N), and confirmed public exploit code represent significant real-world risk for exposed FTP services.

Technical Context

FreeFloat FTP Server is a Windows-based FTP server application vulnerable in version 1.0. The vulnerability resides in the REGET command handler—a standard FTP command used to resume interrupted file transfers from a specified byte offset. The root cause is CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), a classic buffer overflow condition where user-controlled input (likely the offset parameter or filename in the REGET command) is not properly validated before being written to a fixed-size stack or heap buffer. The FTP protocol (RFC 959) defines REGET as a non-standard extension, making implementations more prone to inconsistent input validation. The overflow occurs in an 'unknown function' of the command handler, suggesting the vulnerability may be in argument parsing or internal buffer management rather than core FTP protocol logic.

Affected Products

Product: FreeFloat FTP Server; Affected Version: 1.0; Platform: Windows; CPE: cpe:2.3:a:freefloat:ftp_server:1.0:*:*:*:*:*:*:* (inferred from description—specific CPE may vary); Attack Vector: REGET command handler. No patch version information, vendor advisories, or alternative versions are referenced in the provided data, suggesting either: (a) the vendor has not issued a security advisory, or (b) FreeFloat FTP Server 1.0 is unsupported/abandoned legacy software.

Remediation

Primary: Discontinue use of FreeFloat FTP Server 1.0 and migrate to actively maintained FTP server software or preferably adopt SFTP (SSH File Transfer Protocol) or other modern secure file transfer mechanisms. Immediate interim mitigations if replacement is not immediately feasible: (1) Network segmentation—restrict FTP access (TCP/21) to trusted internal networks only, using firewall rules; (2) Disable REGET command via server configuration if supported; (3) Run FTP server with minimal privileges (non-Administrator account) to limit impact of code execution; (4) Monitor FTP server logs for REGET command attempts; (5) Implement IDS/IPS rules to detect buffer overflow attempts targeting REGET with abnormally long parameters. No official patch version is documented; vendor contact information and security advisory links were not provided in available intelligence. Recommend searching FreeFloat's website or contacting vendor directly for patch availability.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +36
POC: +20

Share

CVE-2025-5596 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy