{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T04:01:40.487","vulnerabilities":[{"cve":{"id":"CVE-2010-20121","sourceIdentifier":"disclosure@vulncheck.com","published":"2025-08-21T20:15:31.610","lastModified":"2025-09-10T20:03:36.037","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"EasyFTP Server versions up to 1.7.0.11 contain a stack-based buffer overflow vulnerability in the FTP command parser. When processing the CWD (Change Working Directory) command, the server fails to properly validate the length of the input string, allowing attackers to overwrite memory on the stack. This flaw enables remote code execution without authentication, as EasyFTP allows anonymous access by default. The vulnerability was resolved in version 1.7.0.12, after which the product was renamed “UplusFtp.”"},{"lang":"es","value":"Las versiones de EasyFTP Server hasta la 1.7.0.11 contienen una vulnerabilidad de desbordamiento de búfer en la pila del analizador de comandos FTP. Al procesar el comando CWD (Cambiar directorio de trabajo), el servidor no valida correctamente la longitud de la cadena de entrada, lo que permite a los atacantes sobrescribir la memoria en la pila. Esta falla permite la ejecución remota de código sin autenticación, ya que EasyFTP permite el acceso anónimo por defecto. La vulnerabilidad se resolvió en la versión 1.7.0.12, tras la cual el producto pasó a llamarse \"UplusFtp\"."}],"metrics":{"cvssMetricV40":[{"source":"disclosure@vulncheck.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.3,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"disclosure@vulncheck.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:easyftp_server_project:easyftp_server:*:*:*:*:*:*:*:*","versionEndExcluding":"1.7.0.12","matchCriteriaId":"C588FCA3-A10E-4DD4-9042-5EF4748FAEBA"}]}]}],"references":[{"url":"https://paulmakowski.wordpress.com/2010/02/28/increasing-payload-size-w-return-address-overwrite/","source":"disclosure@vulncheck.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/easyftp_cwd_fixret.rb","source":"disclosure@vulncheck.com","tags":["Exploit"]},{"url":"https://seclists.org/bugtraq/2010/Feb/202","source":"disclosure@vulncheck.com","tags":["Exploit","Mailing List","Third Party Advisory"]},{"url":"https://www.exploit-db.com/exploits/11668","source":"disclosure@vulncheck.com","tags":["Exploit","VDB Entry"]},{"url":"https://www.exploit-db.com/exploits/12312","source":"disclosure@vulncheck.com","tags":["Exploit","VDB Entry"]},{"url":"https://www.exploit-db.com/exploits/14402","source":"disclosure@vulncheck.com","tags":["Exploit","VDB Entry"]},{"url":"https://www.exploit-db.com/exploits/16737","source":"disclosure@vulncheck.com","tags":["Exploit","VDB Entry"]},{"url":"https://www.vulncheck.com/advisories/easyftp-server-cwd-command-stack-buffer-overflow","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/easyftp_cwd_fixret.rb","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit"]},{"url":"https://seclists.org/bugtraq/2010/Feb/202","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Mailing List","Third Party Advisory"]},{"url":"https://www.exploit-db.com/exploits/11668","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","VDB Entry"]},{"url":"https://www.exploit-db.com/exploits/12312","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","VDB Entry"]},{"url":"https://www.exploit-db.com/exploits/14402","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","VDB Entry"]},{"url":"https://www.exploit-db.com/exploits/16737","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","VDB Entry"]}]}}]}