CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. This issue affects some unknown processing of the component SET Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical buffer overflow vulnerability in the SET Command Handler of PCMan FTP Server 2.0.7 that allows remote attackers to cause denial of service and potentially execute arbitrary code with no authentication required. The vulnerability has been publicly disclosed with exploit code available, making it an active threat to unpatched FTP server deployments. With a CVSS score of 7.3 and low attack complexity, this vulnerability represents a significant risk to organizations running vulnerable versions.
Technical Context
PCMan FTP Server is a lightweight FTP server implementation commonly used in embedded systems and Windows environments. The vulnerability resides in the SET command handler component, which processes FTP protocol commands. CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) indicates that the SET command fails to properly validate input length before writing to a fixed-size buffer, resulting in a classic stack-based or heap-based buffer overflow. When a user sends a specially crafted SET command with an oversized argument, the server writes beyond buffer boundaries, corrupting adjacent memory. This occurs during FTP command parsing, which is executed with server privileges and network-accessible, making remote exploitation trivial. The FTP protocol specification does not inherently limit SET command argument lengths, placing responsibility on server implementations to enforce proper bounds checking.
Affected Products
PCMan FTP Server (['2.0.7'])
Remediation
Upgrade PCMan FTP Server to the latest available version (vendor should release a patched version; check https://www.pcmanftpserver.com or official repository) Workaround: Disable the SET command in FTP server configuration if possible, or restrict SET command usage to authenticated users only Network Mitigation: Implement FTP firewall rules to restrict FTP access to trusted networks only; disable FTP on internet-facing systems and use SFTP/SCP instead Detection: Monitor FTP server logs for abnormally long SET command arguments; implement IDS/IPS rules to block oversized FTP SET commands Alternative: Replace PCMan FTP Server with actively maintained alternatives such as FileZilla Server, ProFTPD, or vsftpd with regular security updates
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-16966