CVE-2020-37032
Unknown Unknown - Not Provided
Remote Code Execution in Wing FTP Server 6.3.8 Lua Console

Publication date: 2026-01-30

Last updated on: 2026-02-18

Assigner: VulnCheck

Description
Wing FTP Server 6.3.8 contains a remote code execution vulnerability in its Lua-based web console that allows authenticated users to execute system commands. Attackers can leverage the console to send POST requests with malicious commands that trigger operating system execution through the os.execute() function.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-30
Last Modified
2026-02-18
Generated
2026-05-07
AI Q&A
2026-01-31
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wftpserver wing_ftp_server 6.3.8
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Wing FTP Server 6.3.8's Lua-based web console, allowing authenticated users to execute arbitrary system commands remotely. Attackers can send specially crafted POST requests containing malicious commands that are executed on the operating system via the os.execute() function.


How can this vulnerability impact me? :

This vulnerability can lead to remote code execution by authenticated users, potentially allowing attackers to take control of the affected system, execute arbitrary commands, compromise data integrity, availability, and confidentiality, and escalate privileges or move laterally within a network.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart