Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 10 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Easyftp Server Project
Easyftp Server Project easyftp Server |
|
CPEs | cpe:2.3:a:easyftp_server_project:easyftp_server:*:*:*:*:*:*:*:* | |
Vendors & Products |
Easyftp Server Project
Easyftp Server Project easyftp Server |
|
Metrics |
cvssV3_1
|
Sat, 23 Aug 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Kmint21 Software
Kmint21 Software easyftp Server |
|
Vendors & Products |
Kmint21 Software
Kmint21 Software easyftp Server |
Fri, 22 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 21 Aug 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | EasyFTP Server 1.7.0.11 and earlier contains a stack-based buffer overflow vulnerability in its HTTP interface. When processing a GET request to list.html, the server fails to properly validate the length of the path parameter. Supplying an excessively long value causes a buffer overflow on the stack, potentially corrupting control flow structures. The vulnerability is exposed through the embedded web server and does not require authentication due to default anonymous access. The issue was resolved in version 1.7.0.12, after which the product was renamed to UplusFtp. | |
Title | EasyFTP Server list.html path Stack Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-08-22T15:31:55.208Z
Reserved: 2025-08-20T18:52:46.120Z
Link: CVE-2010-20113

Updated: 2025-08-22T15:31:46.313Z

Status : Analyzed
Published: 2025-08-21T21:15:33.957
Modified: 2025-09-10T20:06:30.820
Link: CVE-2010-20113

No data.

Updated: 2025-08-23T11:53:20Z