module

Wing FTP Server NULL-byte Authentication Bypass (CVE-2025-47812)

Disclosed
Jun 30, 2025
Created
Jul 7, 2025

Description

Wing FTP Server allows arbitrary Lua code injection via a NULL-byte (%00) truncation bug (CVE-2025-47812).
Supplying %00 as the username makes the C++ authentication routine validate only the prefix,
while the full string is written unfiltered into the session file and later executed with root/SYSTEM privileges,
leading to Remote Code Execution.

Authors

Valentin Lobstein
Julien Ahrens

Platform

Linux,Unix,Windows

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/multi/http/wingftp_null_byte_rce
msf exploit(wingftp_null_byte_rce) > show targets
...targets...
msf exploit(wingftp_null_byte_rce) > set TARGET < target-id >
msf exploit(wingftp_null_byte_rce) > show options
...show and set options...
msf exploit(wingftp_null_byte_rce) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.