Security researchers warn that hackers are exploiting a critical vulnerability in Wing FTP Server to gain control of affected systems.
The vulnerability identified as CVE-2025-47812 can allow remote code execution at the root level due to a null byte and Lua injection issue, according to Huntress researchers.
By infosecbulletin
/ Wednesday , July 16 2025
The OpenJS Foundation has updated Node.js 24.x, 22.x, and 20.x to fix two serious vulnerabilities—CVE-2025-27210 and CVE-2025-27209—that could endanger Windows...
Read More
By infosecbulletin
/ Wednesday , July 16 2025
Broadcom has urgently alerted about four serious vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools, with CVSS scores up to...
Read More
By infosecbulletin
/ Wednesday , July 16 2025
Oracle's July 2025 Critical Patch Update was released fixing 309 security vulnerabilities across its products. The update impacts 34 key...
Read More
By infosecbulletin
/ Tuesday , July 15 2025
Microsoft has quietly revealed that it will stop adding new features to Office apps (Microsoft 365) for Windows 10 users...
Read More
By infosecbulletin
/ Tuesday , July 15 2025
Zuckerberg announced that the company is constructing Gigawatt-Size Data Centers for its AI projects, with the first one launching next...
Read More
By infosecbulletin
/ Tuesday , July 15 2025
Four vulnerabilities in Gigabyte firmware were found by Binarly researchers and reported to Carnegie Mellon University's CERT Coordination Center. The...
Read More
By infosecbulletin
/ Monday , July 14 2025
Security researchers warn that hackers are exploiting a critical vulnerability in Wing FTP Server to gain control of affected systems....
Read More
By infosecbulletin
/ Monday , July 14 2025
A severe vulnerability (CVE-2025-7503) has been found in an IP camera from Shenzhen Liandian Communication Technology LTD. With a CVSSv4...
Read More
By infosecbulletin
/ Saturday , July 12 2025
Proof of concept exploits for a serious SQLi vulnerability in Fortinet FortiWeb have been released, allowing pre-authenticated remote code execution...
Read More
By infosecbulletin
/ Friday , July 11 2025
Kaspersky's research says that in 2024, 33.3 million cyber attacks were launched worldwide against mobile devices. The aim of these...
Read More
Huntress researchers noticed a customer being exploited on July 1, just one day after the previous vulnerability research was published.
Attackers can exploit the vulnerability by crafting a specific input in Lua, the programming language used for handling sessions in Wing FTP.

Wing FTP has about 10,000 customers, including major companies. They informed Cybersecurity Dive that they’ve emailed customers with instructions to fix the vulnerability through an upgrade.
Shadowserver Foundation researchers noted that exploitation of a vulnerability has been occurring since July 1. They estimate about 2,000 computers use Wing FTP and are currently identifying how many may be vulnerable.
The U.S., China and Germany have the most potential exposures, according to Shadowserver.
RCE Security said it discovered the problem while performing a test for one of its customers.
The company warned that the flaw could enable root-level access, allowing attackers to gain significant control.
“Ultimately, this means that an unauthenticated attacker can escalate their privileges to the highest possible ones, which usually always means a total server compromise, including all secrets such as passwords,” said Julien Ahrens, a penetration tester at RCE security. “They can read, modify and delete any file.”
This could not only enable data to be quietly exfiltrated, but systems are also potentially vulnerable to ransomware.