Want to stay ahead of threats in 2025? This research report is all you need to stay updated.

CVE-2025-47812

Wing FTP Server Hit by Critical RCE Vulnerability: CVE-2025-47812 Explained

Vulnerability Overview 

CVE ID: CVE-2025-47812 

CVE Title: Wing FTP Server Null Byte Injection and Remote Code Execution 

Severity: Critical  

Exploit Status: Actively exploited in the wild, public PoC available 

Business Risk: This vulnerability allows attackers to fully take over affected servers without logging in. They can steal data, install malware, stay hidden, and disrupt operations. 

Compliance Impact: High potential for violations of standards like HIPAA, PCI-DSS, and GDPR due to unauthorized access, uncontained malware spread, and exfiltration of sensitive files.

Summary

CVE-2025-47812 is a critical remote code execution vulnerability in Wing FTP Server versions before 7.4.4, caused by improper handling of null (\0) bytes in the login interface. It allows unauthenticated attackers to inject Lua code into session files and execute system commands with root or SYSTEM privileges. The flaw is exploitable even via anonymous FTP accounts and has been actively used for reconnaissance, persistence, and malware delivery attempts. Over 8,000 exposed servers are affected worldwide. CISA added the bug to its Known Exploited Vulnerabilities Catalog on July 14, 2025.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-47812?

Technical Overview

How Does the CVE-2025-47812 Exploit Work?

The attack typically follows these steps:

How Does the CVE-2025-47812 Exploit Work

What Causes CVE-2025-47812?

Vulnerability Root Cause:  

The vulnerability happens because Wing FTP Server doesn’t properly handle NULL (\0) bytes in usernames. Attackers can insert harmful Lua code into session files, which the server later runs with full system privileges. This leads to remote code execution, even without logging in or using anonymous FTP.

How Can You Mitigate CVE-2025-47812?

If immediate patching is delayed or not possible:  

  • Limit Wing FTP Server login access to trusted IP addresses using firewall rules. 
  • Turn off anonymous FTP accounts or limit what they can do. 
  • Watch server logs for unusual logins or changes to session files. 
  • Use a WAF to block requests with suspicious NULL byte characters in usernames. 
  • Regularly check session files for any unexpected code or changes. 
  • Test the server with special payloads to make sure Lua code injection attempts are stopped or recorded.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE-2025-47812 Cause Downtime?

Patch application impact: Moderate. To fix this critical remote code execution vulnerability, update Wing FTP Server to version 7.4.4 or later. Applying the patch typically requires restarting the FTP service, which may cause brief service interruptions or downtime depending on the deployment environment and server configuration. Plan accordingly to minimize impact, especially on production or internet-facing servers. 

Mitigation (if immediate patching is not possible): Partial risk reduction can be achieved by restricting or blocking FTP/SFTP anonymous logins and closely monitoring access. However, there is no complete mitigation until the official patch is applied. All vulnerable servers remain at high risk of full compromise until updated.

How Can You Detect CVE-2025-47812 Exploitation?

Exploitation Signatures:

MITRE ATT&CK Mapping:

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

Patch/Upgrade Instructions:

Mitigation Steps if No Patch:

Remediation Timeline:

Rollback Plan:

Incident Response Considerations:

Compliance & Governance Notes

Audit Trail Requirement:

Policy Alignment:

CVSS Breakdown Table

MetricValue Description
Base Score10Critical severity indicating total server compromise upon successful exploitation (per MITRE CNA)
Attack VectorNetworkExploitable remotely over the network without local access
Attack ComplexityLowStraightforward exploitation without special conditions
Privileges RequiredNoneNo authentication or elevated privileges needed to exploit
User Interaction NoneNo user action required for exploitation
Scope Unchanged Exploitation leads to complete compromise of the affected system, impacting beyond initial component
Confidentiality Impact HighFull system compromise allows disclosure of sensitive data
Integrity ImpactHighExploit enables arbitrary code execution and modification of system state
Availability Impact HighSuccessful exploit can fully compromise availability (root/SYSTEM level access)

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.