Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-58299: CWE-121 Stack-based Buffer Overflow in PCMan FTP Server

0
Critical
VulnerabilityCVE-2024-58299cvecve-2024-58299cwe-121
Published: Fri Dec 12 2025 (12/12/2025, 19:56:39 UTC)
Source: CVE Database V5
Vendor/Project: PCMan
Product: FTP Server

Description

PCMan FTP Server 2.0 contains a buffer overflow vulnerability in the 'pwd' command that allows remote attackers to execute arbitrary code. Attackers can send a specially crafted payload during the FTP login process to overwrite memory and potentially gain system access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 13:58:17 UTC

Technical Analysis

CVE-2024-58299 is a stack-based buffer overflow vulnerability identified in PCMan FTP Server version 2.0. The vulnerability resides in the processing of the 'pwd' command, which is used by FTP clients to request the current working directory. During the FTP login process, an attacker can send a specially crafted payload that exceeds the buffer allocated for handling this command, causing a stack overflow. This overflow enables the attacker to overwrite adjacent memory regions, including control flow data such as return addresses, allowing arbitrary code execution on the affected server. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network without prior access. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), meaning successful exploitation could lead to full system compromise, data theft, or service disruption. Although no public exploits have been reported yet, the critical severity and straightforward exploitation path make this a high-priority vulnerability for organizations running PCMan FTP Server 2.0. No official patches or mitigations have been linked yet, increasing the urgency for defensive measures.

Potential Impact

The impact of CVE-2024-58299 is severe for organizations worldwide using PCMan FTP Server 2.0. Successful exploitation can lead to arbitrary code execution, allowing attackers to gain full control over affected systems. This can result in unauthorized data access, data modification or deletion, installation of persistent malware, lateral movement within networks, and disruption of FTP services. Given that FTP servers often handle sensitive file transfers, the confidentiality and integrity of critical data are at significant risk. The vulnerability's remote and unauthenticated nature increases the attack surface, potentially enabling widespread exploitation if weaponized. Organizations relying on PCMan FTP Server for internal or external file transfers, especially in sectors such as finance, healthcare, government, and critical infrastructure, face heightened risk of data breaches and operational disruptions. The absence of known public exploits currently provides a limited window for proactive defense, but the critical CVSS score indicates that attackers will likely develop exploits rapidly.

Mitigation Recommendations

1. Immediate mitigation should focus on disabling or restricting access to PCMan FTP Server 2.0 instances until a patch is available. 2. Employ network-level controls such as firewall rules to limit FTP access to trusted IP addresses only. 3. Use intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect anomalous FTP commands or buffer overflow attempts targeting the 'pwd' command. 4. Monitor FTP server logs for unusual or malformed 'pwd' command requests indicative of exploitation attempts. 5. If possible, replace PCMan FTP Server 2.0 with a more secure and actively maintained FTP server software that has no known critical vulnerabilities. 6. Implement network segmentation to isolate FTP servers from critical internal systems to limit lateral movement in case of compromise. 7. Regularly back up critical data and verify backup integrity to enable recovery from potential ransomware or destructive attacks following exploitation. 8. Stay alert for official patches or vendor advisories and apply them immediately once released. 9. Consider deploying application-layer firewalls or FTP proxies that can sanitize or block malicious FTP commands.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-11T00:58:28.456Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693c7642a3f11564d0d3b889

Added to database: 12/12/2025, 8:08:34 PM

Last enriched: 3/5/2026, 1:58:17 PM

Last updated: 3/24/2026, 2:20:42 PM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses