๐Ÿ” CVE Alert

CVE-2010-20122

UNKNOWN 0.0

Xftp FTP Client <= 3.0 PWD Response Buffer Overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Xftp FTP Client version up to and including 3.0 (build 0238) contain a stack-based buffer overflow vulnerability triggered by a maliciously crafted PWD response from an FTP server. When the client connects to a server and receives an overly long directory string in response to the PWD command, the client fails to properly validate the length of the input before copying it into a fixed-size buffer. This results in memory corruption and allows remote attackers to execute arbitrary code on the client system.

CWE CWE-121
Vendor netsarang computer, inc.
Product xftp ftp client
Published Aug 21, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for netsarang computer, inc. xftp ftp client

Be the first to know when new unknown vulnerabilities affecting netsarang computer, inc. xftp ftp client are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

NetSarang Computer, Inc. / Xftp FTP Client
* โ‰ค 3.0 (build 0238)

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/xftp_client_pwd.rb exploit-db.com: https://www.exploit-db.com/exploits/12332 exploit-db.com: https://www.exploit-db.com/exploits/16739 web.archive.org: https://web.archive.org/web/20090312072219/http://www.netsarang.com/download/down_xft3.html vulncheck.com: https://www.vulncheck.com/advisories/xftp-ftp-client-pwd-response-buffer-overflow

Credits

zombiefx