A vulnerability, which was classified as critical, was found in FreeFloat FTP Server 1.0. This affects an unknown part of the component HOST Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
                
            References
                    | Link | Resource | 
|---|---|
| https://fitoxs.com/exploit/exploit-9e0f802ba8eab46db6ff5f0c634f96412286b66b33c50a420dd57c1329e3a20d1.txt | Exploit | 
| https://vuldb.com/?ctiid.311079 | Permissions Required VDB Entry | 
| https://vuldb.com/?id.311079 | Third Party Advisory VDB Entry | 
| https://vuldb.com/?submit.587000 | Third Party Advisory VDB Entry Exploit | 
| https://vuldb.com/?submit.587000 | Third Party Advisory VDB Entry Exploit | 
Configurations
                    History
                    13 Jun 2025, 01:00
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Freefloat freefloat Ftp Server Freefloat | |
| CPE | cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:* | |
| References | () https://fitoxs.com/exploit/exploit-9e0f802ba8eab46db6ff5f0c634f96412286b66b33c50a420dd57c1329e3a20d1.txt - Exploit | |
| References | () https://vuldb.com/?ctiid.311079 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.311079 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.587000 - Third Party Advisory, VDB Entry, Exploit | 
05 Jun 2025, 20:12
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
04 Jun 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-06-04 16:15
Updated : 2025-06-13 01:00
NVD link : CVE-2025-5593
Mitre link : CVE-2025-5593
CVE.ORG link : CVE-2025-5593
JSON object : View
Products Affected
                freefloat
- freefloat_ftp_server
