High severityNVD Advisory· Published Aug 21, 2025· Updated Apr 15, 2026
CVE-2010-20107
CVE-2010-20107
Description
A stack-based buffer overflow exists in FTP Synchronizer Professional <= v4.0.73.274. When the client connects to an FTP server and issues a LIST command—typically during sync preview or profile creation—the server’s response containing an overly long filename triggers a buffer overflow. This results in the corruption of the Structured Exception Handler (SEH), potentially allowing remote code execution.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/ftpsynch_list_reply.rbnvd
- web.archive.org/web/20111016194057/https://www.corelan.be/index.php/2010/10/12/death-of-an-ftp-client/nvd
- web.archive.org/web/20111016235434/http://www.ftpsynchronizer.com/nvd
- www.exploit-db.com/exploits/16720nvd
- www.ftpsynchronizer.comnvd
- www.vulncheck.com/advisories/ftp-synchronizer-professional-stack-buffer-overflownvd
News mentions
0No linked articles in our index yet.