In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/ | Exploit Third Party Advisory | 
| https://www.vicarius.io/vsociety/posts/cve-2025-47812-detection-script-remote-code-execution-vulnerability-in-wing-ftp-server | Third Party Advisory | 
| https://www.vicarius.io/vsociety/posts/cve-2025-47812-mitigation-script-remote-code-execution-vulnerability-in-wing-ftp-server | Mitigation Third Party Advisory | 
| https://www.wftpserver.com | Product | 
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-47812 | |
| https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-47812-exploited-in-wild | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Oct 2025, 23:17
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Oct 2025, 20:20
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Oct 2025, 19:21
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
16 Sep 2025, 14:02
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.vicarius.io/vsociety/posts/cve-2025-47812-detection-script-remote-code-execution-vulnerability-in-wing-ftp-server - Third Party Advisory | |
| References | () https://www.vicarius.io/vsociety/posts/cve-2025-47812-mitigation-script-remote-code-execution-vulnerability-in-wing-ftp-server - Mitigation, Third Party Advisory | |
| References | () https://www.wftpserver.com - Product | 
15 Sep 2025, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
15 Jul 2025, 14:43
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Wftpserver Wftpserver wing Ftp Server | |
| CPE | cpe:2.3:a:wftpserver:wing_ftp_server:*:*:*:*:*:*:*:* | |
| References | () https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/ - Exploit, Third Party Advisory | |
| References | () https://www.wftpserver.com - Broken Link | |
| References | () https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-47812-exploited-in-wild - Exploit, Third Party Advisory | 
14 Jul 2025, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| References | 
 | 
10 Jul 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-07-10 17:15
Updated : 2025-10-21 23:17
NVD link : CVE-2025-47812
Mitre link : CVE-2025-47812
CVE.ORG link : CVE-2025-47812
JSON object : View
Products Affected
                wftpserver
- wing_ftp_server
CWE
                
                    
                        
                        CWE-158
                        
            Improper Neutralization of Null Byte or NUL Character
