CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability was found in FreeFloat FTP Server 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component XMKD Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical buffer overflow vulnerability in the XMKD Command Handler of FreeFloat FTP Server 1.0 that allows unauthenticated remote attackers to achieve arbitrary code execution with low-impact consequences (confidentiality, integrity, and availability). The vulnerability has been publicly disclosed with exploit code available, making it a significant risk for exposed FTP deployments; however, the CVSS 7.3 score reflects moderate rather than critical severity due to limited impact scope.
Technical Context
FreeFloat FTP Server 1.0 contains a buffer overflow vulnerability (CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer) in its XMKD command handler. The XMKD command is an FTP protocol extension used to create directories on the server. The vulnerability stems from insufficient bounds checking when processing XMKD command arguments, allowing an attacker to write beyond allocated buffer boundaries. This is a classic stack or heap-based buffer overflow that can be triggered via raw FTP protocol communication on the standard FTP control channel (TCP port 21). The attack requires no authentication (PR:N in CVSS vector) and exploits a flaw in how the server parses and processes user-supplied directory names in the XMKD command.
Affected Products
FreeFloat FTP Server version 1.0 (CPE identifier would be cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*). No version range data is provided, but version 1.0 is explicitly affected. It is unknown whether earlier or later versions are vulnerable without access to vendor advisories. The vulnerability is independent of the underlying operating system (Windows, Linux) as it affects the application layer FTP protocol handler.
Remediation
Specific remediation steps: (1) Immediate: Disable or restrict network access to the FTP service using firewall rules if the service is not critical; (2) Upgrade: Contact FreeFloat vendor for patched versions (version number unknown from provided data—check vendor website for 1.0.1 or later); (3) Compensating controls: Implement network segmentation to limit FTP access to trusted IP ranges only; deploy IDS/IPS rules to detect and block oversized XMKD command arguments; (4) Long-term: Migrate to actively maintained FTP server alternatives (e.g., vsftpd, ProFTPD, Pure-FTPd) with regular security updates. Note: FreeFloat FTP Server appears to be unmaintained legacy software; consider replacement rather than patching if vendor support is unavailable.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17006