2026-02-06 23:14CVE-2020-37107VulnCheck
PUBLISHED5.2CWE-120

Core FTP LE 2.2 - Denial of Service

Core FTP LE 2.2 contains a denial of service vulnerability that allows attackers to crash the application by overwriting the account field with a large buffer. Attackers can create a text file with 20,000 repeated characters and paste it into the account field to cause the application to become unresponsive and require reinstallation.

Problem type

Affected products

Core FTP

Core FTP LE

2.2 build 1947 - AFFECTED

References

GitHub Security Advisories

GHSA-3jf7-cmmw-4r75

Core FTP LE 2.2 contains a denial of service vulnerability that allows attackers to crash the...

https://github.com/advisories/GHSA-3jf7-cmmw-4r75

Core FTP LE 2.2 contains a denial of service vulnerability that allows attackers to crash the application by overwriting the account field with a large buffer. Attackers can create a text file with 20,000 repeated characters and paste it into the account field to cause the application to become unresponsive and require reinstallation.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2020-37107
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2020-37107",
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "dateUpdated": "2026-02-06T23:14:05.841Z",
    "dateReserved": "2026-02-01T13:16:06.490Z",
    "datePublished": "2026-02-06T23:14:05.841Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck",
        "dateUpdated": "2026-02-06T23:14:05.841Z"
      },
      "title": "Core FTP LE 2.2 - Denial of Service",
      "descriptions": [
        {
          "lang": "en",
          "value": "Core FTP LE 2.2 contains a denial of service vulnerability that allows attackers to crash the application by overwriting the account field with a large buffer. Attackers can create a text file with 20,000 repeated characters and paste it into the account field to cause the application to become unresponsive and require reinstallation."
        }
      ],
      "affected": [
        {
          "vendor": "Core FTP",
          "product": "Core FTP LE",
          "versions": [
            {
              "version": "2.2 build 1947",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
              "cweId": "CWE-120",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://www.exploit-db.com/exploits/48137",
          "name": "ExploitDB-48137",
          "tags": [
            "exploit"
          ]
        },
        {
          "url": "http://www.coreftp.com/",
          "name": "Core FTP Vendor Homepage",
          "tags": [
            "product"
          ]
        },
        {
          "url": "http://www.coreftp.com/download.html",
          "name": "Core FTP Download Page",
          "tags": [
            "product"
          ]
        },
        {
          "url": "https://www.vulncheck.com/advisories/core-ftp-le-denial-of-service",
          "name": "VulnCheck Advisory: Core FTP LE 2.2 - Denial of Service",
          "tags": [
            "third-party-advisory"
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS"
        },
        {
          "format": "CVSS",
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "attackVector": "NETWORK",
            "attackComplexity": "LOW",
            "privilegesRequired": "NONE",
            "userInteraction": "NONE",
            "scope": "UNCHANGED",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH"
          }
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Ismael Nava",
          "type": "finder"
        }
      ]
    }
  }
}