A critical vulnerability in Wing FTP Server (CVE-2025-47812) has opened the door for attackers to take full control of affected systems. By sneaking malicious code into a login request using a null byte trick, hackers can exploit the server’s session handling to execute code with high-level access. The flaw lies in how the server processes session files, inadvertently running any injected Lua script. What makes this especially dangerous is how quickly threat actors jumped on it active attacks were seen just a day after the flaw was disclosed. Adding to the urgency, a public proof-of-concept (PoC) exploit is already available, making it even easier for attackers to replicate. If you’re using Wing FTP Server version 7.4.3 or earlier, updating immediately is crucial to avoid falling victim.
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox