
For authenticated users, this console can be exploited to obtain a reverse shell using the os.execute() function, which is native to LUA.
Wing FTP Server console is written in LUA language. This hash password can easily convert into plain text using an online decrypter. This file can be found in the C:\Program Files\Wing FTP Server\Data\_ADMINISTRATOR location.
Admin Credentials on HTTP Request:When an admin logs in to the Wing FTP Server, the credentials are sent in plain text.Ī file named admins.xml contains the username and MD5 hashed password. On Shodan, we observed more than 150 devices that are publicly available on the internet, which may be vulnerable.įollowing vulnerabilities found in Wing FTP server: Free client FTP Rush for FTP/SFTP file transfer. Multiple Protocols Support FTP, FTPS, SFTP, and HTTP/HTTPS. This vulnerability allows authenticated remote attackers to execute arbitrary commands on the targeted server. Free Edition After the trial period, you can continue using it as a Free edition for non-commercial use.
Recently, an authenticated RCE vulnerability was found in the Wing FTP Server.