๐Ÿ” CVE Alert

CVE-2010-20108

UNKNOWN 0.0

FTPPad <= 1.2.0 Stack Buffer Overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

FTPPad <= 1.2.0 contains a stack-based buffer overflow vulnerability in its FTP directory listing parser. When the client connects to an FTP server and receives a crafted response to a LIST command containing an excessively long directory and filename, the application fails to properly validate input length. This results in a buffer overflow that overwrites the saved Extended Instruction Pointer (EIP), allowing remote attackers to execute arbitrary code.

CWE CWE-121
Vendor ftppad
Product ftppad ftp client
Published Aug 21, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for ftppad ftppad ftp client

Be the first to know when new unknown vulnerabilities affecting ftppad ftppad ftp client are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

FTPPad / FTPPad FTP Client
* โ‰ค 1.2.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/ftppad_list_reply.rb exploit-db.com: https://www.exploit-db.com/exploits/16726 web.archive.org: https://web.archive.org/web/20111016194057/https://www.corelan.be/index.php/2010/10/12/death-of-an-ftp-client/ chip.de: https://www.chip.de/downloads/FTPPad_12993921.html vulncheck.com: https://www.vulncheck.com/advisories/ftppad-stack-buffer-overflow

Credits

corelanc0d3r of Corelan Team