CVE-2012-10030
high-risk
Published 2025-08-05
FreeFloat FTP Server contains multiple critical design flaws that allow unauthenticated remote attackers to upload arbitrary files to sensitive system directories. The server accepts empty credentials, defaults user access to the root of the C:\ drive, and imposes no restrictions on file type or destination path. These conditions enable attackers to upload executable payloads and .mof files to locations such as system32 and wbem\mof, where Windows Management Instrumentation (WMI) automatically processes and executes them. This results in remote code execution with SYSTEM-level privileges, without requiring user interaction.
Do I need to act?
!
57.1% chance of exploitation in next 30 days
EPSS score — higher than 43% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
https://www.fortiguard.com/encyclopedia/ips/34209/freefloat-ftp-server-arbitrary...
Third Party Advisory
https://www.vulncheck.com/advisories/freefloat-ftp-server-arbitrary-file-upload
55
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
18/34 · Moderate
Exposure
5/34 · Minimal