CrushFTP Chaos: The Vulnerability Drama That’s Keeping Hackers and Developers on Their Toes

Huntress is on the case, tracking post-exploitation antics of hackers exploiting the CrushFTP vulnerability, CVE-2025-31161. Attackers have been testing access, installing legitimate tools like AnyDesk and MeshAgent for nefarious deeds. Despite the confusion over CVE assignments, the vulnerability is officially tracked as CVE-2025-31161. Stay vigilant, folks!

Pro Dashboard

Hot Take:

Looks like the CrushFTP vulnerability is causing more drama than a reality TV show! With developers pointing fingers at security firms, and hackers sneaking in like party crashers, it’s a cybersecurity soap opera with a plot twist every episode. Just make sure to install those patches before the hackers start filming the sequel!

Key Points:

  • CrushFTP vulnerability CVE-2025-31161 allows attackers to bypass authentication.
  • Huntress observed post-exploitation activities aimed at persistent access.
  • Targets included companies in marketing, retail, and semiconductor sectors.
  • Hackers used AnyDesk and MeshAgent for remote access and credential collection.
  • Controversy arose over CVE assignment and disclosure timing.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?