CrushFTP Chaos: The Vulnerability Drama That’s Keeping Hackers and Developers on Their Toes
Huntress is on the case, tracking post-exploitation antics of hackers exploiting the CrushFTP vulnerability, CVE-2025-31161. Attackers have been testing access, installing legitimate tools like AnyDesk and MeshAgent for nefarious deeds. Despite the confusion over CVE assignments, the vulnerability is officially tracked as CVE-2025-31161. Stay vigilant, folks!

Hot Take:
Looks like the CrushFTP vulnerability is causing more drama than a reality TV show! With developers pointing fingers at security firms, and hackers sneaking in like party crashers, it’s a cybersecurity soap opera with a plot twist every episode. Just make sure to install those patches before the hackers start filming the sequel!
Key Points:
- CrushFTP vulnerability CVE-2025-31161 allows attackers to bypass authentication.
- Huntress observed post-exploitation activities aimed at persistent access.
- Targets included companies in marketing, retail, and semiconductor sectors.
- Hackers used AnyDesk and MeshAgent for remote access and credential collection.
- Controversy arose over CVE assignment and disclosure timing.
Already a member? Log in here