Critical severityNVD Advisory· Published Aug 21, 2025· Updated Apr 15, 2026
CVE-2010-20115
CVE-2010-20115
Description
Arcane Software’s Vermillion FTP Daemon (vftpd) versions up to and including 1.31 contains a memory corruption vulnerability triggered by a malformed FTP PORT command. The flaw arises from an out-of-bounds array access during input parsing, allowing an attacker to manipulate stack memory and potentially execute arbitrary code. Exploitation requires direct access to the FTP service and is constrained by a single execution attempt if the daemon is installed as a Windows service.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/vermillion_ftpd_port.rbnvd
- web.archive.org/web/20100213162028/http://www.softsea.com/review/Vermillion-FTP-Daemon.htmlnvd
- web.archive.org/web/20100416140657/http://www.global-evolution.info/news/files/vftpd/vftpd.txtnvd
- www.broadcom.com/support/security-center/attacksignatures/detailnvd
- www.exploit-db.com/exploits/11293nvd
- www.juniper.net/us/en/threatlabs/ips-signatures/detail.FTP:EXPLOIT:VERMILLION-PORT-OF.htmlnvd
- www.vulncheck.com/advisories/vermillion-ftp-daemon-port-command-memory-corruptionnvd
News mentions
0No linked articles in our index yet.