๐Ÿ” CVE Alert

CVE-2010-10014

UNKNOWN 0.0

Odin Secure FTP <= 4.1 Stack Buffer Overflow via LIST Response

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Odin Secure FTP <= 4.1 is vulnerable to a stack-based buffer overflow when parsing directory listings received in response to an FTP LIST command. A malicious FTP server can send an overly long filename in the directory listing, which overflows a fixed-size stack buffer in the client and overwrites the Structured Exception Handler (SEH). This allows remote attackers to execute arbitrary code on the client system.

CWE CWE-121
Vendor odin software
Product odin secure ftp
Published Aug 20, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for odin software odin secure ftp

Be the first to know when new unknown vulnerabilities affecting odin software odin secure ftp are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Odin Software / Odin Secure FTP
* โ‰ค 4.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
web.archive.org: https://web.archive.org/web/20111007123101/http://odinshare.com/secure-ftp-expert.html raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/odin_list_reply.rb exploit-db.com: https://www.exploit-db.com/exploits/16716 web.archive.org: https://web.archive.org/web/20111016194057/https://www.corelan.be/index.php/2010/10/12/death-of-an-ftp-client/ vulncheck.com: https://www.vulncheck.com/advisories/odin-secure-ftp-stack-buffer-overflow-via-list-response

Credits

rick2600 corelanc0d3r of Corelan Team