WU-FTPD Buffer Overflow

HIGH (10.0) No Patch (9574 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 3.14% chance of exploitation (percentile: 86%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: Exploit-DB

How we test →

What is it?

WU-FTPD is an open-source FTP server software used by some organizations for file transfer. This vulnerability allows remote attackers to gain root privileges via macro variables in a message file, potentially leading to unauthorized access to sensitive data.

Am I affected?

You're affected if you use WU-FTPD version 2.17 or earlier. To check if your system is vulnerable, run the command grep -r "WUFTPD_VERSION" /etc/wuftpd/wuftpd.conf on Linux systems or grep -r "WUFTPD_VERSION" %windir%\system32\wuftpd.exe on Windows.

Note: This vulnerability does not affect WU-FTPD versions 2.18 and later, which have been patched.

Affected Products

SourceForge / WU-FTPD

How to fix

To fix this vulnerability, upgrade to WU-FTPD version 2.18 or later from the official website: https://sourceforge.net/projects/wuftpd/files/WuFTPD%20v2.18/

Immediate mitigations:

  • Disable macro expansion in message files by setting MacroExpansion = no in the /etc/wuftpd/wuftpd.conf file on Linux systems.
  • On Windows, disable macro expansion by setting MacroExpansion = no in the %windir%\system32\wuftpd.exe configuration file.