Impact
MiniFtp contains a buffer overflow in the parseconf_load_setting function that allows a local attacker to supply oversized configuration values exceeding 128 bytes. By crafting a malicious miniftpd.conf file, the attacker can overflow a stack buffer and overwrite the return address, leading to execution of arbitrary code with root privileges. The weakness is a classic stack-based buffer overflow (CWE-787). The impact enables the attacker to gain full control over the system running MiniFtp, compromising confidentiality, integrity, and availability. This attack requires local access to modify the configuration file, as the vulnerability is triggered only when the daemon parses the file during startup.
Affected Systems
The affected product is MiniFtp from SkyQinSC. No specific version range is listed in the advisory; version information is missing. Therefore, all versions of MiniFtp that still parse unfettered configuration files are potentially vulnerable.
Risk and Exploitability
The CVSS score of 8.6 indicates high severity. EPSS data is unavailable, so the probability of exploitation in the wild cannot be quantified. The vulnerability has not been cataloged in CISA’s KEV list. The likely attack vector is local, requiring the attacker to modify the configuration file before starting MiniFtp. Once exploited, the attacker achieves root-level code execution, which is a critical risk for any system where MiniFtp is in use.
OpenCVE Enrichment