EUVD-2025-17004

| CVE-2025-5664 HIGH
2025-06-05 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 17:53 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:53 euvd
EUVD-2025-17004
PoC Detected
Jun 24, 2025 - 15:21 vuln.today
Public exploit code
CVE Published
Jun 05, 2025 - 15:15 nvd
HIGH 7.3

Description

A vulnerability was found in FreeFloat FTP Server 1.0 and classified as critical. This issue affects some unknown processing of the component RESTART Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

Critical buffer overflow vulnerability in the RESTART Command Handler of FreeFloat FTP Server 1.0 that allows unauthenticated remote attackers to cause denial of service and potentially achieve information disclosure or integrity compromise. The vulnerability is classified as critical by the vendor, has a disclosed proof-of-concept, and poses immediate risk to exposed FTP servers; however, the CVSS 7.3 score reflects moderate actual impact (low confidentiality, integrity, and availability) rather than critical severity.

Technical Context

FreeFloat FTP Server is a Windows-based FTP daemon that implements RFC 959 FTP protocol. The vulnerability exists in the RESTART (REST) command handler, which is responsible for setting the restart/resume point for file transfers. The ROOT CAUSE is CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), a classic stack or heap buffer overflow. When a malformed REST command with an oversized argument is sent to the FTP server, the handler fails to properly validate input length before copying data into a fixed-size buffer. Since FTP RESTART commands are part of the core protocol and require no authentication (RFC 959 specifies REST as a non-authenticated command), any network-accessible FTP server is vulnerable. The affected CPE would be: cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:* (exact CPE not provided in source but inferred from description). The buffer overflow occurs in memory space controlled by the FTP service process, potentially enabling code execution or crash-based DoS.

Affected Products

PRODUCT: FreeFloat FTP Server, VERSION: 1.0 (explicitly stated; earlier or later versions status unknown from description). AFFECTED COMPONENT: RESTART Command Handler (RFC 959 REST command). DEPLOYMENT: Primarily Windows systems. NO VENDOR ADVISORY LINK PROVIDED in the source data, but affected organizations should check FreeFloat website (freefloat.com or legacy archives) for security bulletins. NOTE: FreeFloat FTP Server is legacy software; vendor support status unclear and patches may not exist or may require version upgrade. Organizations using this product should conduct a full inventory of exposed instances.

Remediation

PRIMARY: Upgrade to a patched version of FreeFloat FTP Server if available from vendor (vendor advisory must be consulted—none provided in source). SECONDARY (if no patch exists): (1) Disable FTP service entirely and migrate to SFTP/SSH File Transfer (recommended); (2) Restrict FTP port access via firewall to trusted internal networks only; (3) Run FTP service under a least-privilege account to limit code execution impact; (4) Monitor FTP logs for suspicious REST commands (e.g., unusually long arguments); (5) Deploy intrusion detection signatures to alert on malformed RESTART commands; (6) Consider WAF/IPS rules to drop REST commands with payloads exceeding normal size limits (typically <10 bytes for numeric arguments). PATCH STATUS: Unknown—organization must contact FreeFloat vendor directly. Given the age of FreeFloat 1.0, vendor may have ceased support; in this case, migration to modern FTP/SFTP alternatives is mandatory.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +36
POC: +20

Share

EUVD-2025-17004 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy