{"uuid": "417805b0-71df-4d61-b2b9-4f648389c899", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-47812", "type": "exploited", "source": "https://t.me/cibsecurity/85757", "content": "\ud83d\udd8b\ufe0f Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild \ud83d\udd8b\ufe0f\n\nA recently disclosed maximumseverity security flaw impacting the Wing FTP Server has come under active exploitation in the wild, according to Huntress. The vulnerability, tracked as CVE202547812 CVSS score 10.0, is a case of improper handling of null '0' bytes in the server's web interface, which allows for remote code execution. It has been addressed in version 7.4.4. \"The user and.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-07-11T11:15:09.000000Z"}