๐Ÿ” CVE Alert

CVE-2012-10055

UNKNOWN 0.0

ComSndFTP v1.3.7 Beta USER Format String RCE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

ComSndFTP FTP Server version 1.3.7 Beta contains a format string vulnerability in its handling of the USER command. By sending a specially crafted username containing format specifiers, a remote attacker can overwrite a hardcoded function pointer in memory (specifically WSACleanup from Ws2_32.dll). This allows the attacker to redirect execution flow and bypass DEP protections using a ROP chain, ultimately leading to arbitrary code execution. The vulnerability is exploitable without authentication and affects default configurations.

CWE CWE-134
Vendor comsndftp
Product ftp server
Published Aug 13, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for comsndftp ftp server

Be the first to know when new unknown vulnerabilities affecting comsndftp ftp server are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

ComSndFTP / FTP Server
1.3.7 Beta

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb exploit-db.com: https://www.exploit-db.com/exploits/19024 exploit-db.com: https://www.exploit-db.com/exploits/19177 web.archive.org: https://web.archive.org/web/20120317214524/http://ftp.comsnd.com/ vulncheck.com: https://www.vulncheck.com/advisories/comsndftp-user-format-string-rce

Credits

ChaoYi Huang