CVE-2010-20045
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-20

Last updated on: 2025-08-22

Assigner: VulnCheck

Description
FileWrangler <= 5.30 suffers from a stack-based buffer overflow vulnerability when parsing directory listings from an FTP server. A malicious server can send an overlong folder name in response to a LIST command, triggering memory corruption during client-side rendering. Exploitation requires passive user interactionβ€”simply connecting to the serverβ€”without further input. Successful exploitation may lead to arbitrary code execution.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-20
Last Modified
2025-08-22
Generated
2026-05-06
AI Q&A
2025-08-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cursorarts filewrangler 5.30
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stack-based buffer overflow in FileWrangler versions up to 5.30. It occurs when the software parses directory listings from an FTP server. A malicious FTP server can send an excessively long folder name in response to a LIST command, causing memory corruption during the client's rendering of the directory. Exploiting this vulnerability requires only that the user connects to the malicious server, without any further interaction. Successful exploitation can lead to arbitrary code execution on the client system.


How can this vulnerability impact me? :

The impact of this vulnerability includes the potential for arbitrary code execution on the affected system. This means an attacker controlling a malicious FTP server could execute malicious code on the user's machine simply by the user connecting to that server. This could lead to system compromise, data theft, or further malware installation without the user's knowledge or additional actions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart