CVE-2010-20045
BaseFortify
Publication date: 2025-08-20
Last updated on: 2025-08-22
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cursorarts | filewrangler | 5.30 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack-based buffer overflow in FileWrangler versions up to 5.30. It occurs when the software parses directory listings from an FTP server. A malicious FTP server can send an excessively long folder name in response to a LIST command, causing memory corruption during the client's rendering of the directory. Exploiting this vulnerability requires only that the user connects to the malicious server, without any further interaction. Successful exploitation can lead to arbitrary code execution on the client system.
How can this vulnerability impact me? :
The impact of this vulnerability includes the potential for arbitrary code execution on the affected system. This means an attacker controlling a malicious FTP server could execute malicious code on the user's machine simply by the user connecting to that server. This could lead to system compromise, data theft, or further malware installation without the user's knowledge or additional actions.