CVE-2010-20049
LeapFTP < 3.1.x Stack Buffer Overflow
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
LeapFTP < 3.1.x contains a stack-based buffer overflow vulnerability in its FTP client parser. When the client receives a directory listing containing a filename longer than 528 bytes, the application fails to properly bound-check the input and overwrites the Structured Exception Handler (SEH) chain. This allows an attacker operating a malicious FTP server to execute arbitrary code on the victim’s machine when the file is listed or downloaded.
| CWE | CWE-121 |
| Vendor | leapware |
| Product | leapftp |
| Published | Aug 20, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for leapware leapftp
Be the first to know when new unknown vulnerabilities affecting leapware leapftp are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
LeapWare / LeapFTP
* < 3.1.*
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/leapftp_list_reply.rb exploit-db.com: https://www.exploit-db.com/exploits/16704 web.archive.org: https://web.archive.org/web/20111016194057/https://www.corelan.be/index.php/2010/10/12/death-of-an-ftp-client/ web.archive.org: https://web.archive.org/web/20111013232627/http://www.leapware.com/ vulncheck.com: https://www.vulncheck.com/advisories/leapftp-stack-buffer-overflow
Credits
corelanc0d3r of Corelan Team