CVE-2024-0546: CWE-404 Denial of Service in EasyFTP
A vulnerability, which was classified as problematic, has been found in EasyFTP 1.7.0. This issue affects some unknown processing of the component LIST Command Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250715.
AI Analysis
Technical Summary
CVE-2024-0546 is a medium-severity vulnerability identified in EasyFTP version 1.7.0, related to the LIST Command Handler component. The vulnerability is classified under CWE-404, which pertains to improper resource shutdown or release, leading to a denial of service (DoS) condition. Specifically, the issue arises from improper handling of certain LIST command inputs, which can be manipulated remotely by an unauthenticated attacker without user interaction. Exploiting this vulnerability causes the EasyFTP service to become unavailable, disrupting normal FTP operations. Although the exact technical mechanism of the flaw is not detailed, the vulnerability allows an attacker to send crafted LIST commands that cause the server to mishandle resources, resulting in a crash or hang. The vulnerability has been publicly disclosed but no known exploits are currently observed in the wild. No patches or fixes have been published yet, which means affected systems remain vulnerable. The CVSS v3.1 base score is 5.3, reflecting a network attack vector with low complexity, no privileges required, and no user interaction needed, but limited to availability impact only (no confidentiality or integrity impact).
Potential Impact
For European organizations using EasyFTP 1.7.0, this vulnerability poses a risk of service disruption due to denial of service attacks. FTP servers often support critical file transfer operations in enterprise environments, including data exchange, backups, and legacy system integrations. A successful DoS attack could interrupt business processes, cause operational delays, and potentially impact dependent services. While the vulnerability does not compromise data confidentiality or integrity, the availability impact can affect sectors relying on continuous FTP availability, such as manufacturing, logistics, and financial services. The lack of authentication requirement and ease of exploitation increase the risk of opportunistic attacks, especially in environments where EasyFTP servers are exposed to the internet or untrusted networks. Given the absence of known exploits in the wild, the immediate threat level is moderate, but the public disclosure and lack of patching mean that attackers could develop exploits, increasing future risk.
Mitigation Recommendations
European organizations should immediately assess their exposure to EasyFTP 1.7.0 instances, particularly those accessible from external networks. As no official patches are currently available, temporary mitigations include restricting network access to the FTP server using firewalls or VPNs to limit exposure to trusted users only. Implement network-level intrusion detection or anomaly detection systems to monitor for unusual LIST command traffic patterns indicative of exploitation attempts. Consider disabling or restricting the LIST command functionality if feasible within operational requirements. Organizations should also plan to upgrade or replace EasyFTP with a more secure and actively maintained FTP solution once a patch or update addressing CVE-2024-0546 is released. Regularly monitor vulnerability advisories for updates or patches. Additionally, maintain robust incident response procedures to quickly address any service disruptions caused by attempted exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2024-0546: CWE-404 Denial of Service in EasyFTP
Description
A vulnerability, which was classified as problematic, has been found in EasyFTP 1.7.0. This issue affects some unknown processing of the component LIST Command Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250715.
AI-Powered Analysis
Technical Analysis
CVE-2024-0546 is a medium-severity vulnerability identified in EasyFTP version 1.7.0, related to the LIST Command Handler component. The vulnerability is classified under CWE-404, which pertains to improper resource shutdown or release, leading to a denial of service (DoS) condition. Specifically, the issue arises from improper handling of certain LIST command inputs, which can be manipulated remotely by an unauthenticated attacker without user interaction. Exploiting this vulnerability causes the EasyFTP service to become unavailable, disrupting normal FTP operations. Although the exact technical mechanism of the flaw is not detailed, the vulnerability allows an attacker to send crafted LIST commands that cause the server to mishandle resources, resulting in a crash or hang. The vulnerability has been publicly disclosed but no known exploits are currently observed in the wild. No patches or fixes have been published yet, which means affected systems remain vulnerable. The CVSS v3.1 base score is 5.3, reflecting a network attack vector with low complexity, no privileges required, and no user interaction needed, but limited to availability impact only (no confidentiality or integrity impact).
Potential Impact
For European organizations using EasyFTP 1.7.0, this vulnerability poses a risk of service disruption due to denial of service attacks. FTP servers often support critical file transfer operations in enterprise environments, including data exchange, backups, and legacy system integrations. A successful DoS attack could interrupt business processes, cause operational delays, and potentially impact dependent services. While the vulnerability does not compromise data confidentiality or integrity, the availability impact can affect sectors relying on continuous FTP availability, such as manufacturing, logistics, and financial services. The lack of authentication requirement and ease of exploitation increase the risk of opportunistic attacks, especially in environments where EasyFTP servers are exposed to the internet or untrusted networks. Given the absence of known exploits in the wild, the immediate threat level is moderate, but the public disclosure and lack of patching mean that attackers could develop exploits, increasing future risk.
Mitigation Recommendations
European organizations should immediately assess their exposure to EasyFTP 1.7.0 instances, particularly those accessible from external networks. As no official patches are currently available, temporary mitigations include restricting network access to the FTP server using firewalls or VPNs to limit exposure to trusted users only. Implement network-level intrusion detection or anomaly detection systems to monitor for unusual LIST command traffic patterns indicative of exploitation attempts. Consider disabling or restricting the LIST command functionality if feasible within operational requirements. Organizations should also plan to upgrade or replace EasyFTP with a more secure and actively maintained FTP solution once a patch or update addressing CVE-2024-0546 is released. Regularly monitor vulnerability advisories for updates or patches. Additionally, maintain robust incident response procedures to quickly address any service disruptions caused by attempted exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-14T19:03:40.757Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034b182aa0cae27e66b8
Added to database: 6/3/2025, 2:14:35 PM
Last enriched: 7/4/2025, 2:41:40 PM
Last updated: 8/10/2025, 10:04:17 PM
Views: 16
Related Threats
CVE-2025-8863: CWE-319 Cleartext Transmission of Sensitive Information in YugabyteDB Inc YugabyteDB
HighCVE-2025-8847: Cross Site Scripting in yangzongzhuan RuoYi
MediumCVE-2025-8839: Improper Authorization in jshERP
MediumCVE-2025-8862: CWE-201 Insertion of Sensitive Information Into Sent Data in YugabyteDB Inc YugabyteDB
HighCVE-2025-8846: Stack-based Buffer Overflow in NASM Netwide Assember
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.