CVE-2010-10014
Odin Secure FTP <= 4.1 Stack Buffer Overflow via LIST Response
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Odin Secure FTP <= 4.1 is vulnerable to a stack-based buffer overflow when parsing directory listings received in response to an FTP LIST command. A malicious FTP server can send an overly long filename in the directory listing, which overflows a fixed-size stack buffer in the client and overwrites the Structured Exception Handler (SEH). This allows remote attackers to execute arbitrary code on the client system.
| CWE | CWE-121 |
| Vendor | odin software |
| Product | odin secure ftp |
| Published | Aug 20, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for odin software odin secure ftp
Be the first to know when new unknown vulnerabilities affecting odin software odin secure ftp are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Odin Software / Odin Secure FTP
* โค 4.1
References
web.archive.org: https://web.archive.org/web/20111007123101/http://odinshare.com/secure-ftp-expert.html raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/odin_list_reply.rb exploit-db.com: https://www.exploit-db.com/exploits/16716 web.archive.org: https://web.archive.org/web/20111016194057/https://www.corelan.be/index.php/2010/10/12/death-of-an-ftp-client/ vulncheck.com: https://www.vulncheck.com/advisories/odin-secure-ftp-stack-buffer-overflow-via-list-response
Credits
rick2600 corelanc0d3r of Corelan Team