Impact
Free Float FTP 1.0 contains a buffer overflow in the handler for the STOR command. A remote attacker can connect to the FTP service, authenticate with anonymous credentials, and send a STOR request that includes 247 bytes of padding followed by a crafted return address and shellcode. This overflows a buffer and causes the server to execute the injected code, allowing the attacker to run arbitrary commands on the FTP server.
Affected Systems
The vulnerability affects Free Float FTP Server version 1.0, delivered by Freefloat. No other versions are listed. Site‑administrators should confirm whether this exact software is in use and if the STOR command is enabled.
Risk and Exploitability
The CVSS score of 9.3 indicates high severity. EPSS shows exploitation probability lower than 1%, and the flaw is not currently listed in the CISA KEV catalog. The attack vector is inferred from the description as remote network access via the FTP protocol using anonymous login, which requires no privilege beyond the default access granted to unauthenticated users. Because the flaw permits arbitrary code execution, it poses a significant risk and demands prompt remediation.
OpenCVE Enrichment