Executive Summary

Informations
Name CVE-2025-5196 First vendor Publication 2025-05-26
Vendor Cve Last vendor Modification 2025-05-28

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability has been found in Wing FTP Server up to 7.4.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Lua Admin Console. The manipulation leads to execution with unnecessary privileges. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 7.4.4 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains: "[W]e do not consider it as a security vulnerability, because the system admin in WingFTP has full permissions [...], but you can suggest the user run WingFTP service as Normal User rather than SYSTEM/Root, it will be safer."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5196

Sources (Detail)

https://github.com/Nouvexr/Wing-FTP-Server-7.4.4-RCE-Authenticated/blob/main/...
https://vuldb.com/?ctiid.310279
https://vuldb.com/?id.310279
https://vuldb.com/?submit.584253
https://www.wftpserver.com/serverhistory.htm
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2025-05-29 00:21:52
  • Multiple Updates
2025-05-26 21:20:35
  • First insertion