Article Details

Scrape Timestamp (UTC): 2025-07-11 18:21:13.162

Source: https://www.theregister.com/2025/07/11/1010_wing_ftp_bug_exploited/

Original Article Text

Click to Toggle View

CVSS 10 RCE in Wing FTP exploited within 24 hours, security researchers warn. Intruders looked up how to use curl mid-attack - rookie errors kept damage minimal. Huntress security researchers observed exploitation of the CVSS 10.0 remote code execution (RCE) flaw in Wing FTP Server on July 1, just one day after its public disclosure. Wing FTP Server is a cross-platform file-transfer solution, supporting FTP, FTPS, SFTP, and HTTP/S. It is used by over 10,000 customers worldwide for secure data exchange, including Airbus, Reuters, and the US Air Force, according to its website. Patched on May 14, the researchers behind the discovery of CVE-2025-47812 did not publish their findings until over a month after fixes came in version 7.4.4. RCE Security, which found and reported the issue, said in its report on June 30 that once Lua code is injected into a session file, execution as root on affected Wing FTP instances is trivial, hence the maximum possible severity score. The main issue at play was the way in which the Wing FTP web interface handled null bytes in the username field, allowing attackers to execute a Lua injection attack. If an attacker appended a username input with a %00 null byte, anything after that would be interpreted as Lua code ­­- which would then be injected into session object files and deserialized by the application. Huntress said that it was only aware of one successful in-the-wild exploit attempt for this vulnerability, but urged users to patch regardless, if they have not already. The attackers did not seem too sophisticated, the researchers noted, saying they seemed incapable of causing much damage before their access was neutralized. According to Huntress' experts, attacks began within 24 hours of the public disclosure, which included details about how the vulnerability was discovered. Attackers typically use these writeups to craft their own exploit code. By 0956 UTC the following day, three attackers had already attempted to connect to the one target's Wing FTP server, and about six and a half hours later, a fourth entered the fray. The fourth quickly began enumerating files and creating new users to establish persistent remote access, but then failed to execute commands that Huntress said were "poorly constructed." That failure and inexperience were a running theme throughout the fourth attacker's time on the organization's Wing FTP server, with several other command execution attempts failing due to "rookie errors." At one point, Huntress said that after digging through the victim's logs, it was able to deduce that the fourth intruder had to look up how to use curl mid-attack. The researchers also said that it seemed like at one point the attacker may have phoned a friend for help, as a fifth connected to the server after a period of quiet. Attacker number four then began trying to cause some trouble using PowerShell, but when that crashed on them, they tried to download a trojan, but then Microsoft Defender scooped that up before it could execute. The server crashed after that, booting the attackers out, and the victim organization isolated it shortly after, marking an end to a frustrating day out for the threat actors. "Despite the threat actors' unavailing activity, this incident shows that CVE-2025-47812 is being actively targeted at this point," Huntress said.  "While we've only seen exploitation activity on one customer as of July 8, 2025, organizations can best protect themselves by updating to version 7.4.4." This incident also underscores how legacy protocols can harbor hidden risks. Given FTP has been around since the early seventies, security was not at the forefront of mind when developing the protocol itself.  The technology has since been overtaken by secure FTP (SFTP) and managed file transfer (MFT) solutions, which offer greater versatility and security. Wing FTP Server also supports those secure file transfer protocols, so there are more tightly secured options for its customers when connecting to the server. According to its user manual [PDF], these more secure options are only available on the secure and corporate editions, and not the free or standard editions. Many projects, like Chrome, Firefox, Debian, and more, either disabled FTP by default or completely removed support for it many years ago, reflecting the changing attitudes toward the protocol.

Daily Brief Summary

CYBERCRIME // Rapid Exploitation of Wing FTP Server Post-Disclosure Detected

CVSS 10.0-rated RCE vulnerability in Wing FTP Server exploited one day after its public disclosure.

Over 10,000 customers, including high-profile firms and U.S. Air Force, potentially affected by the exploit.

Attackers attempted to utilize the vulnerability by injecting Lua code via null byte manipulation in the username field.

Initial attacks showed limited damage due to attackers' poor command execution and lack of sophistication.

One attacker was observed looking up how to use curl during the attack, highlighting inexperience.

Microsoft Defender intercepted an attempted Trojan download, preventing further harm.

Victim organization isolated the compromised server shortly after detection, minimizing impact.

Huntress researchers stress the importance of updating to patched version 7.4.4 for security.