A stack-based buffer overflow exists in FTP Synchronizer Professional <= v4.0.73.274. When the client connects to an FTP server and issues a LIST command—typically during sync preview or profile creation—the server’s response containing an overly long filename triggers a buffer overflow. This results in the corruption of the Structured Exception Handler (SEH), potentially allowing remote code execution.
CVSS
No CVSS.
References
Configurations
No configuration.
History
22 Aug 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/ftpsynch_list_reply.rb - | |
References | () https://www.exploit-db.com/exploits/16720 - | |
Summary |
|
21 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-21 21:15
Updated : 2025-08-22 18:08
NVD link : CVE-2010-20107
Mitre link : CVE-2010-20107
CVE.ORG link : CVE-2010-20107
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow