Wing FTP Server Flaw: The Exploit That’s Giving Hackers a VIP Pass

Wing FTP Server is having a bad byte day! The maximum-severity security flaw, CVE-2025-47812, allows remote code execution via mischievous null bytes. Disguised as harmless, these bytes let attackers inject arbitrary Lua code. If you’re still running an older version, update to 7.4.4 pronto—before your server becomes a hacker’s playground!

Pro Dashboard

Hot Take:

Wing FTP Server users, it’s time to put on your running shoes and sprint to the update button! With a vulnerability rated a perfect 10 on the CVSS scale, this issue isn’t just a minor hiccup; it’s a full-blown security opera with threat actors taking the center stage. Given that anonymous accounts can exploit it, it’s like leaving your front door wide open with a “Welcome, Hackers!” mat. Update now, or prepare to play a game of cybersecurity dodgeball.

Key Points:

  • Critical security flaw in Wing FTP Server (CVE-2025-47812) allows remote code execution.
  • Flaw arises from improper handling of null (‘’) bytes in the server’s web interface.
  • Exploitable via anonymous FTP accounts, with evidence of active exploitation.
  • Over 8,000 devices running Wing FTP Server are publicly accessible, with 5,004 exposing their web interface.
  • Users are urged to update to version 7.4.4 or later to mitigate the risk.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?