๐Ÿ” CVE Alert

CVE-2010-20103

UNKNOWN 0.0

ProFTPD 1.3.3c Backdoor Command Execution

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

A malicious backdoor was embedded in the official ProFTPD 1.3.3c source tarball distributed between November 28 and December 2, 2010. The backdoor implements a hidden FTP command trigger that, when invoked, causes the server to execute arbitrary shell commands with root privileges. This allows remote, unauthenticated attackers to run any OS command on the FTP server host.

CWE CWE-912
Vendor proftpd project
Product proftpd (professional ftp daemon)
Published Aug 20, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for proftpd project proftpd (professional ftp daemon)

Be the first to know when new unknown vulnerabilities affecting proftpd project proftpd (professional ftp daemon) are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

ProFTPD Project / ProFTPD (Professional FTP Daemon)
1.3.3c

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
web.archive.org: https://web.archive.org/web/20111107212129/http://rsync.proftpd.org/ raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb exploit-db.com: https://www.exploit-db.com/exploits/15662 exploit-db.com: https://www.exploit-db.com/exploits/16921 advisories.checkpoint.com: https://advisories.checkpoint.com/defense/advisories/public/2011/cpai-2010-151.html/ github.com: https://github.com/proftpd/proftpd proftpd.org: http://www.proftpd.org/ vulncheck.com: https://www.vulncheck.com/advisories/proftpd-backdoor-command-execution