CVE-2025-5635: Buffer Overflow in PCMan FTP Server
A vulnerability classified as critical was found in PCMan FTP Server 2.0.7. This vulnerability affects unknown code of the component PLS Command Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5635 is a buffer overflow vulnerability identified in PCMan FTP Server version 2.0.7, specifically within the PLS Command Handler component. This vulnerability allows an unauthenticated remote attacker to send specially crafted commands to the FTP server, triggering a buffer overflow condition. Buffer overflow vulnerabilities occur when a program writes more data to a buffer than it can hold, potentially overwriting adjacent memory. This can lead to arbitrary code execution, crashes, or other unpredictable behavior. In this case, the vulnerability is exploitable remotely without requiring authentication or user interaction, increasing the attack surface significantly. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is rated as low to medium, suggesting that while exploitation could lead to some compromise, it may not fully allow complete system takeover or data exfiltration. No patches or fixes have been publicly linked yet, and no known exploits are reported in the wild, but public disclosure of the exploit code increases the risk of active exploitation. The vulnerability affects only version 2.0.7 of PCMan FTP Server, a product used for FTP services, which are often critical for file transfer operations in various organizations.
Potential Impact
For European organizations, the impact of this vulnerability depends on the extent to which PCMan FTP Server 2.0.7 is deployed within their infrastructure. FTP servers often handle sensitive file transfers, including internal documents, backups, or client data. Exploitation could lead to service disruption due to crashes or potential unauthorized code execution, which might be leveraged for lateral movement or further attacks within the network. Given the medium severity and lack of required authentication, attackers could remotely compromise vulnerable servers, potentially impacting confidentiality and integrity of transferred data. Disruption of FTP services could affect business continuity, especially in sectors relying on legacy FTP infrastructure. Additionally, organizations in regulated industries (e.g., finance, healthcare) may face compliance risks if data confidentiality or availability is compromised. However, the absence of known active exploits and the limited affected version reduce immediate widespread impact. Organizations using updated or alternative FTP solutions are not affected. Overall, the threat is moderate but warrants timely attention to prevent exploitation.
Mitigation Recommendations
1. Immediate mitigation should involve identifying all instances of PCMan FTP Server version 2.0.7 within the network through asset inventory and vulnerability scanning. 2. If possible, disable or isolate vulnerable FTP servers from external network access until a patch or update is available. 3. Monitor network traffic for unusual FTP command patterns that could indicate exploitation attempts targeting the PLS Command Handler. 4. Implement network-level controls such as firewall rules to restrict FTP access to trusted IP addresses only. 5. Consider migrating to more secure and actively maintained FTP server software that supports encrypted protocols like FTPS or SFTP to reduce exposure. 6. Regularly check vendor advisories or security bulletins for patches or updates addressing this vulnerability and apply them promptly once available. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting buffer overflow attempts against FTP services. 8. Conduct internal awareness and training to ensure system administrators understand the risks and mitigation steps related to legacy FTP servers.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-5635: Buffer Overflow in PCMan FTP Server
Description
A vulnerability classified as critical was found in PCMan FTP Server 2.0.7. This vulnerability affects unknown code of the component PLS Command Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5635 is a buffer overflow vulnerability identified in PCMan FTP Server version 2.0.7, specifically within the PLS Command Handler component. This vulnerability allows an unauthenticated remote attacker to send specially crafted commands to the FTP server, triggering a buffer overflow condition. Buffer overflow vulnerabilities occur when a program writes more data to a buffer than it can hold, potentially overwriting adjacent memory. This can lead to arbitrary code execution, crashes, or other unpredictable behavior. In this case, the vulnerability is exploitable remotely without requiring authentication or user interaction, increasing the attack surface significantly. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is rated as low to medium, suggesting that while exploitation could lead to some compromise, it may not fully allow complete system takeover or data exfiltration. No patches or fixes have been publicly linked yet, and no known exploits are reported in the wild, but public disclosure of the exploit code increases the risk of active exploitation. The vulnerability affects only version 2.0.7 of PCMan FTP Server, a product used for FTP services, which are often critical for file transfer operations in various organizations.
Potential Impact
For European organizations, the impact of this vulnerability depends on the extent to which PCMan FTP Server 2.0.7 is deployed within their infrastructure. FTP servers often handle sensitive file transfers, including internal documents, backups, or client data. Exploitation could lead to service disruption due to crashes or potential unauthorized code execution, which might be leveraged for lateral movement or further attacks within the network. Given the medium severity and lack of required authentication, attackers could remotely compromise vulnerable servers, potentially impacting confidentiality and integrity of transferred data. Disruption of FTP services could affect business continuity, especially in sectors relying on legacy FTP infrastructure. Additionally, organizations in regulated industries (e.g., finance, healthcare) may face compliance risks if data confidentiality or availability is compromised. However, the absence of known active exploits and the limited affected version reduce immediate widespread impact. Organizations using updated or alternative FTP solutions are not affected. Overall, the threat is moderate but warrants timely attention to prevent exploitation.
Mitigation Recommendations
1. Immediate mitigation should involve identifying all instances of PCMan FTP Server version 2.0.7 within the network through asset inventory and vulnerability scanning. 2. If possible, disable or isolate vulnerable FTP servers from external network access until a patch or update is available. 3. Monitor network traffic for unusual FTP command patterns that could indicate exploitation attempts targeting the PLS Command Handler. 4. Implement network-level controls such as firewall rules to restrict FTP access to trusted IP addresses only. 5. Consider migrating to more secure and actively maintained FTP server software that supports encrypted protocols like FTPS or SFTP to reduce exposure. 6. Regularly check vendor advisories or security bulletins for patches or updates addressing this vulnerability and apply them promptly once available. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting buffer overflow attempts against FTP services. 8. Conduct internal awareness and training to ensure system administrators understand the risks and mitigation steps related to legacy FTP servers.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-04T11:35:52.670Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68418437182aa0cae2dccca3
Added to database: 6/5/2025, 11:49:11 AM
Last enriched: 7/7/2025, 4:10:46 AM
Last updated: 1/7/2026, 5:22:34 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.