Cyberthreat Advisories | 1898 & Co.

Exploitation of Critical RCE Vulnerability in Wing FTP Server

Written by The 1898 & Co. Team | July 31, 2025

Recent developments have highlighted a critical remote code execution (RCE) vulnerability in Wing FTP Server, identified as CVE-2025-47812. This flaw, which allows unauthenticated attackers to execute code with root or SYSTEM privileges, has been actively exploited just one day after its technical details were made public. The vulnerability arises from unsafe handling of null-terminated strings in C++ and improper input sanitization in Lua, enabling attackers to bypass authentication and inject malicious Lua code. This issue affects Wing FTP Server versions 7.4.3 and earlier, with a patch available in version 7.4.4.

In addition to CVE-2025-47812, three other vulnerabilities have been identified in Wing FTP Server: CVE-2025-27889, CVE-2025-47811, and CVE-2025-47813. These flaws range from allowing password exfiltration via crafted URLs to revealing file system paths through overlong UID cookies. The combination of these vulnerabilities poses significant risks, particularly as Wing FTP Server is widely used in enterprise and SMB environments for secure file transfers.

The cybersecurity landscape is witnessing increased activity from threat actors exploiting these vulnerabilities. Attackers have been observed using reconnaissance commands, establishing persistence by creating new users, and attempting data exfiltration. Despite some failed attacks, likely due to defensive measures such as Microsoft Defender, the potential for successful exploitation remains high. Organizations using Wing FTP Server are urged to upgrade to the latest version or implement recommended mitigations to protect their systems.

Threats and Vulnerabilities

CVE-2025-47812 is a critical RCE vulnerability in Wing FTP Server that allows attackers to execute arbitrary code with the highest system privileges. This flaw is exploited by injecting null bytes into the username field, bypassing authentication checks, and enabling Lua code injection into session files. The impact of this vulnerability is severe, as it can lead to complete system compromise.

CVE-2025-27889 involves the unsafe inclusion of user passwords in JavaScript variables, which can be exfiltrated via crafted URLs. This vulnerability poses a risk of credential theft if users submit login forms on vulnerable systems.

CVE-2025-47811 highlights the lack of sandboxing or privilege drop in Wing FTP Server, making RCEs more dangerous as the server runs with root/SYSTEM privileges by default. Although deemed less critical by the vendor, this flaw increases the risk associated with other vulnerabilities.

CVE-2025-47813 allows attackers to reveal file system paths by supplying an overlong UID cookie. This information disclosure can aid attackers in crafting more targeted attacks against vulnerable systems.

Client Impact

The exploitation of these vulnerabilities could lead to significant operational disruptions for clients using Wing FTP Server. Successful attacks may result in unauthorized access to sensitive data, leading to data breaches and potential financial losses. The reputational damage from such incidents could be substantial, affecting client trust and business relationships.

From a compliance perspective, organizations may face regulatory challenges if these vulnerabilities are exploited, particularly if they result in data breaches involving personally identifiable information (PII). This could lead to audits or penalties under data protection regulations such as GDPR or CCPA.

Mitigations

To mitigate the risks associated with these vulnerabilities, clients are advised to take the following actions:

  1. Upgrade to Wing FTP Server version 7.4.4 immediately to address the identified vulnerabilities.
  2. If upgrading is not feasible, disable or restrict HTTP/HTTPS access to the Wing FTP web portal.
  3. Disable anonymous logins to reduce the attack surface.
  4. Monitor the session directory for suspicious additions that may indicate exploitation attempts.
  5. Implement network segmentation to limit access to critical systems and data.
  6. Regularly review and update security policies and procedures to align with current threats.
  7. Conduct security awareness training for employees to recognize phishing attempts and other social engineering tactics.

By implementing these measures, organizations can significantly reduce their exposure to these vulnerabilities and enhance their overall security posture.

1898 & Co. Response

1898 & Co. is actively addressing the current threat landscape by offering specialized services designed to mitigate emerging threats like those affecting Wing FTP Server. Our team provides thorough vulnerability assessments and penetration testing services to identify and address potential security gaps in client environments.

We have updated our security protocols to incorporate the latest threat intelligence related to these vulnerabilities, ensuring our clients receive timely and relevant guidance. Our collaborative efforts with industry allies and government agencies enhance our ability to provide comprehensive threat intelligence and response strategies.

Our ongoing research into these vulnerabilities allows us to develop effective mitigation strategies tailored to our clients' specific needs. We have successfully assisted several organizations in upgrading their systems and implementing robust security measures to prevent exploitation attempts.

Sources

  1. CISA adds CVE-2025-47812 to Known Exploited Vulnerabilities Catalog
  2. CVE Details for CVE-2025-47812