CVE-2010-20103
ProFTPD 1.3.3c Backdoor Command Execution
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
A malicious backdoor was embedded in the official ProFTPD 1.3.3c source tarball distributed between November 28 and December 2, 2010. The backdoor implements a hidden FTP command trigger that, when invoked, causes the server to execute arbitrary shell commands with root privileges. This allows remote, unauthenticated attackers to run any OS command on the FTP server host.
| CWE | CWE-912 |
| Vendor | proftpd project |
| Product | proftpd (professional ftp daemon) |
| Published | Aug 20, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for proftpd project proftpd (professional ftp daemon)
Be the first to know when new unknown vulnerabilities affecting proftpd project proftpd (professional ftp daemon) are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
ProFTPD Project / ProFTPD (Professional FTP Daemon)
1.3.3c
References
web.archive.org: https://web.archive.org/web/20111107212129/http://rsync.proftpd.org/ raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb exploit-db.com: https://www.exploit-db.com/exploits/15662 exploit-db.com: https://www.exploit-db.com/exploits/16921 advisories.checkpoint.com: https://advisories.checkpoint.com/defense/advisories/public/2011/cpai-2010-151.html/ github.com: https://github.com/proftpd/proftpd proftpd.org: http://www.proftpd.org/ vulncheck.com: https://www.vulncheck.com/advisories/proftpd-backdoor-command-execution