Critical severityNVD Advisory· Published Aug 13, 2025· Updated Apr 15, 2026
CVE-2012-10055
CVE-2012-10055
Description
ComSndFTP FTP Server version 1.3.7 Beta contains a format string vulnerability in its handling of the USER command. By sending a specially crafted username containing format specifiers, a remote attacker can overwrite a hardcoded function pointer in memory (specifically WSACleanup from Ws2_32.dll). This allows the attacker to redirect execution flow and bypass DEP protections using a ROP chain, ultimately leading to arbitrary code execution. The vulnerability is exploitable without authentication and affects default configurations.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rbnvd
- web.archive.org/web/20120317214524/http://ftp.comsnd.com/nvd
- www.exploit-db.com/exploits/19024nvd
- www.exploit-db.com/exploits/19177nvd
- www.vulncheck.com/advisories/comsndftp-user-format-string-rcenvd
News mentions
0No linked articles in our index yet.