Wing FTP Remote Code Execution Vulnerability

Score: 75/100 10 articles 100.0% coherence 1 day ago

Activity Timeline

CC-4680 - Active Exploitation of Critical Vulnerab...
NHS Digital Cyber Alerts
Jul 11
10:33
Hackers are exploiting critical RCE flaw in Wing F...
BleepingComputer
Jul 12
14:13
CISA Adds One Known Exploited Vulnerability to Cat...
US-CERT Current Activity
Jul 14
12:00
Hackers exploiting flaw in widely used Wing FTP Se...
Cybersecurity Dive
Jul 14
15:35
Wing FTP Server Vulnerability Actively Exploited –...
Cybersecurity News
Jul 14
17:10
CISA adds serious Wing FTP Server vulnerability to...
IT News Security
Jul 15
03:55
CISA Issues Alert on Actively Exploited Wing FTP S...
GB Hackers
Jul 15
05:15
Wing FTP Vulnerability Actively Exploited Globally...
Data Breach Today UK
Jul 15
06:56
CISA Warns of Wing FTP Server Vulnerability Active...
Cybersecurity News
Jul 15
08:14
Wing FTP Remote Code Execution Vulnerability...
FortiGuard Threat Signal
Primary Article
Jul 16
01:23
Threat Signal Report Wing FTP Remote Code Execution Vulnerability Description What is the Vulnerability? CVE-2025-47812 is a recently disclosed Remote Code Execution (RCE) vulnerability impacting Wing FTP Server, a cross-platform file transfer solution. This critical flaw affects versions prior to 7.4.4, and, if successfully exploited, may allow remote attackers to execute arbitrary code within the context of the vulnerable application. The vulnerability stems from null byte handling issues and a Lua injection flaw, which can lead to root or SYSTEM-level code execution.CISA has added CVE-2025-47812 to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation on July 14, 2025. What is the recommended Mitigation? The vendor has released a patch addressing the issue. There are already reports of the vulnerability being actively exploited in the wild, which underscores the urgency for affected users to update their systems immediately. What FortiGuard Cove...

Cluster AI

Beta Pro

Save to Folder

Choose a folder to save this cluster: