Wing FTP Server Flaw: The Exploit That’s Giving Hackers a VIP Pass
Wing FTP Server is having a bad byte day! The maximum-severity security flaw, CVE-2025-47812, allows remote code execution via mischievous null bytes. Disguised as harmless, these bytes let attackers inject arbitrary Lua code. If you’re still running an older version, update to 7.4.4 pronto—before your server becomes a hacker’s playground!

Hot Take:
Wing FTP Server users, it’s time to put on your running shoes and sprint to the update button! With a vulnerability rated a perfect 10 on the CVSS scale, this issue isn’t just a minor hiccup; it’s a full-blown security opera with threat actors taking the center stage. Given that anonymous accounts can exploit it, it’s like leaving your front door wide open with a “Welcome, Hackers!” mat. Update now, or prepare to play a game of cybersecurity dodgeball.
Key Points:
- Critical security flaw in Wing FTP Server (CVE-2025-47812) allows remote code execution.
- Flaw arises from improper handling of null (‘’) bytes in the server’s web interface.
- Exploitable via anonymous FTP accounts, with evidence of active exploitation.
- Over 8,000 devices running Wing FTP Server are publicly accessible, with 5,004 exposing their web interface.
- Users are urged to update to version 7.4.4 or later to mitigate the risk.