Wing FTP Flaw Enables System Takeover

Red | Vulnerability Report
Download PDF

A critical vulnerability in Wing FTP Server (CVE-2025-47812) has opened the door for attackers to take full control of affected systems. By sneaking malicious code into a login request using a null byte trick, hackers can exploit the server’s session handling to execute code with high-level access. The flaw lies in how the server processes session files, inadvertently running any injected Lua script. What makes this especially dangerous is how quickly threat actors jumped on it active attacks were seen just a day after the flaw was disclosed. Adding to the urgency, a public proof-of-concept (PoC) exploit is already available, making it even easier for attackers to replicate. If you’re using Wing FTP Server version 7.4.3 or earlier, updating immediately is crucial to avoid falling victim.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox

Cyber Horizons 2025

What Last Year’s Attacks Reveal About Today’s Risks

Watch the Webinar on-demand and get a FREE copy of our Cyber Horizons 2025 report.

Our Speakers
Speaker 1

Prateek Bhajanka Global Field CISO & Former Gartner Analyst Hive Pro Inc.

Speaker 2

Ankit Mani Manager Threat Intel HiveForce Labs

Speaker 3

Sreevani Tonipe Senior Threat Researcher HiveForce Labs