EUVD-2025-17006

| CVE-2025-5666 HIGH
2025-06-05 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 17:53 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:53 euvd
EUVD-2025-17006
PoC Detected
Jun 24, 2025 - 15:22 vuln.today
Public exploit code
CVE Published
Jun 05, 2025 - 16:15 nvd
HIGH 7.3

Description

A vulnerability was found in FreeFloat FTP Server 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component XMKD Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Analysis

Critical buffer overflow vulnerability in the XMKD Command Handler of FreeFloat FTP Server 1.0 that allows unauthenticated remote attackers to achieve arbitrary code execution with low-impact consequences (confidentiality, integrity, and availability). The vulnerability has been publicly disclosed with exploit code available, making it a significant risk for exposed FTP deployments; however, the CVSS 7.3 score reflects moderate rather than critical severity due to limited impact scope.

Technical Context

FreeFloat FTP Server 1.0 contains a buffer overflow vulnerability (CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer) in its XMKD command handler. The XMKD command is an FTP protocol extension used to create directories on the server. The vulnerability stems from insufficient bounds checking when processing XMKD command arguments, allowing an attacker to write beyond allocated buffer boundaries. This is a classic stack or heap-based buffer overflow that can be triggered via raw FTP protocol communication on the standard FTP control channel (TCP port 21). The attack requires no authentication (PR:N in CVSS vector) and exploits a flaw in how the server parses and processes user-supplied directory names in the XMKD command.

Affected Products

FreeFloat FTP Server version 1.0 (CPE identifier would be cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*). No version range data is provided, but version 1.0 is explicitly affected. It is unknown whether earlier or later versions are vulnerable without access to vendor advisories. The vulnerability is independent of the underlying operating system (Windows, Linux) as it affects the application layer FTP protocol handler.

Remediation

Specific remediation steps: (1) Immediate: Disable or restrict network access to the FTP service using firewall rules if the service is not critical; (2) Upgrade: Contact FreeFloat vendor for patched versions (version number unknown from provided data—check vendor website for 1.0.1 or later); (3) Compensating controls: Implement network segmentation to limit FTP access to trusted IP ranges only; deploy IDS/IPS rules to detect and block oversized XMKD command arguments; (4) Long-term: Migrate to actively maintained FTP server alternatives (e.g., vsftpd, ProFTPD, Pure-FTPd) with regular security updates. Note: FreeFloat FTP Server appears to be unmaintained legacy software; consider replacement rather than patching if vendor support is unavailable.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +36
POC: +20

Share

EUVD-2025-17006 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy