Critical severity9.8NVD Advisory· Published Mar 10, 2017· Updated May 13, 2026
CVE-2017-6465
CVE-2017-6465
Description
Remote Code Execution was discovered in FTPShell Client 6.53. By default, the client sends a PWD command to the FTP server it is connecting to; however, it doesn't check the response's length, leading to a buffer overflow situation.
Affected products
1- cpe:2.3:a:ftpshell:ftpshell_client:6.53:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- packetstormsecurity.com/files/141456/FTPShell-Client-6.53-Buffer-Overflow.htmlnvdExploitThird Party AdvisoryVDB Entry
- www.exploit-db.com/exploits/41511/nvdExploitThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/96570nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.