CVE-2010-20113

Public Exploit
EasyFTP Server list.html path Stack Buffer Overflow

Description

EasyFTP Server 1.7.0.11 and earlier contains a stack-based buffer overflow vulnerability in its HTTP interface. When processing a GET request to list.html, the server fails to properly validate the length of the path parameter. Supplying an excessively long value causes a buffer overflow on the stack, potentially corrupting control flow structures. The vulnerability is exposed through the embedded web server and does not require authentication due to default anonymous access. The issue was resolved in version 1.7.0.12, after which the product was renamed to UplusFtp.

Category

9.3
CVSS
Severity: Critical
CVSS 4.0 •
EPSS 0.07%
Third-Party Advisory vulncheck.com
Affected: KMiNT21 Software EasyFTP Server
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2010-20113?
CVE-2010-20113 has been scored as a critical severity vulnerability.
How to fix CVE-2010-20113?
To fix CVE-2010-20113, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2010-20113 being actively exploited in the wild?
It is possible that CVE-2010-20113 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2010-20113?
CVE-2010-20113 affects KMiNT21 Software EasyFTP Server.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.