Wing FTP Server 6.3.8 contains a remote code execution vulnerability in its Lua-based web console that allows authenticated users to execute system commands. Attackers can leverage the console to send POST requests with malicious commands that trigger operating system execution through the os.execute() function.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/48676 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/wing-ftp-server-remote-code-execution | Broken Link |
| https://www.wftpserver.com/ | Product |
Configurations
History
18 Feb 2026, 14:51
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Wftpserver
Wftpserver wing Ftp Server |
|
| CPE | cpe:2.3:a:wftpserver:wing_ftp_server:6.3.8:*:*:*:*:*:*:* | |
| References | () https://www.exploit-db.com/exploits/48676 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/wing-ftp-server-remote-code-execution - Broken Link | |
| References | () https://www.wftpserver.com/ - Product |
30 Jan 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-30 23:16
Updated : 2026-02-18 14:51
NVD link : CVE-2020-37032
Mitre link : CVE-2020-37032
CVE.ORG link : CVE-2020-37032
JSON object : View
Products Affected
wftpserver
- wing_ftp_server
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
