🔐 CVE Alert

CVE-2010-20049

UNKNOWN 0.0

LeapFTP < 3.1.x Stack Buffer Overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

LeapFTP < 3.1.x contains a stack-based buffer overflow vulnerability in its FTP client parser. When the client receives a directory listing containing a filename longer than 528 bytes, the application fails to properly bound-check the input and overwrites the Structured Exception Handler (SEH) chain. This allows an attacker operating a malicious FTP server to execute arbitrary code on the victim’s machine when the file is listed or downloaded.

CWE CWE-121
Vendor leapware
Product leapftp
Published Aug 20, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for leapware leapftp

Be the first to know when new unknown vulnerabilities affecting leapware leapftp are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

LeapWare / LeapFTP
* < 3.1.*

References

NVD ↗ CVE.org ↗ EPSS Data ↗
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/leapftp_list_reply.rb exploit-db.com: https://www.exploit-db.com/exploits/16704 web.archive.org: https://web.archive.org/web/20111016194057/https://www.corelan.be/index.php/2010/10/12/death-of-an-ftp-client/ web.archive.org: https://web.archive.org/web/20111013232627/http://www.leapware.com/ vulncheck.com: https://www.vulncheck.com/advisories/leapftp-stack-buffer-overflow

Credits

corelanc0d3r of Corelan Team