Wing FTP Server 6.3.8 contains a remote code execution vulnerability in its Lua-based web console that allows authenticated users to execute system commands. Attackers can leverage the console to send POST requests with malicious commands that trigger operating system execution through the os.execute() function.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/48676 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/wing-ftp-server-remote-code-execution | Broken Link |
| https://www.wftpserver.com/ | Product |
Configurations
History
No history.
Information
Published : 2026-01-30 23:16
Updated : 2026-02-18 14:51
NVD link : CVE-2020-37032
Mitre link : CVE-2020-37032
CVE.ORG link : CVE-2020-37032
JSON object : View
Products Affected
wftpserver
- wing_ftp_server
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
