CVE-2020-37032

Wing FTP Server 6.3.8 contains a remote code execution vulnerability in its Lua-based web console that allows authenticated users to execute system commands. Attackers can leverage the console to send POST requests with malicious commands that trigger operating system execution through the os.execute() function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wftpserver:wing_ftp_server:6.3.8:*:*:*:*:*:*:*

History

18 Feb 2026, 14:51

Type Values Removed Values Added
First Time Wftpserver
Wftpserver wing Ftp Server
CPE cpe:2.3:a:wftpserver:wing_ftp_server:6.3.8:*:*:*:*:*:*:*
References () https://www.exploit-db.com/exploits/48676 - () https://www.exploit-db.com/exploits/48676 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/wing-ftp-server-remote-code-execution - () https://www.vulncheck.com/advisories/wing-ftp-server-remote-code-execution - Broken Link
References () https://www.wftpserver.com/ - () https://www.wftpserver.com/ - Product

30 Jan 2026, 23:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-30 23:16

Updated : 2026-02-18 14:51


NVD link : CVE-2020-37032

Mitre link : CVE-2020-37032

CVE.ORG link : CVE-2020-37032


JSON object : View

Products Affected

wftpserver

  • wing_ftp_server
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')