Critical severityNVD Advisory· Published Aug 20, 2025· Updated Apr 15, 2026
CVE-2010-20049
CVE-2010-20049
Description
LeapFTP < 3.1.x contains a stack-based buffer overflow vulnerability in its FTP client parser. When the client receives a directory listing containing a filename longer than 528 bytes, the application fails to properly bound-check the input and overwrites the Structured Exception Handler (SEH) chain. This allows an attacker operating a malicious FTP server to execute arbitrary code on the victim’s machine when the file is listed or downloaded.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/leapftp_list_reply.rbnvd
- web.archive.org/web/20111013232627/http://www.leapware.com/nvd
- web.archive.org/web/20111016194057/https://www.corelan.be/index.php/2010/10/12/death-of-an-ftp-client/nvd
- www.exploit-db.com/exploits/16704nvd
- www.vulncheck.com/advisories/leapftp-stack-buffer-overflownvd
News mentions
0No linked articles in our index yet.