Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CrushFTP Servers Hit by Critical Zero-Day Vulnerability CVE-2025-54309

    CrushFTP Servers Hit by Critical Zero-Day Vulnerability CVE-2025-54309

    July 22, 2025

    CVE-2025-54309

    A new zero-day vulnerability in CrushFTP file transfer servers is being actively exploited by cybercriminals, compromising systems around the world. Tracked as CVE-2025-54309, the CrushFTP zero-day vulnerability was first observed in active exploitation on July 18, 2025. 

    This zero-day vulnerability in CrushFTP is particularly dangerous due to the stealthy nature of the attack vector, which leverages both HTTP and HTTPS protocols to infiltrate vulnerable servers. This automatically makes internet-facing instances of CrushFTP especially susceptible to unauthorized access if not promptly patched. 

    CVE-2025-54309: Vulnerability Details and Origins 

    The attackers behind CVE-2025-54309 reverse-engineered CrushFTP’s codebase to uncover and weaponize a flaw that had technically been addressed in prior updates but remained exploitable in outdated installations. This means organizations that have not kept up with regular patching cycles are now vulnerable to this active threat. 

    In an official statement, CrushFTP noted, “Hackers apparently reverse engineered our code and found some bug which we had already fixed. They are exploiting it for anyone who has not stayed current on new versions.” The company believes the exploited bug existed in builds prior to July 1, 2025, and that newer versions had already silently patched the issue during unrelated updates to AS2 functionality over HTTP(S). 

    Affected Versions 

    The vulnerability affects the following builds: 

    • Version 10: All versions below 10.8.5
    • Version 11: All versions below 11.3.4_23

    Users running these versions who haven’t updated may already be compromised, especially if their servers are directly accessible over the internet. 

    Signs of Compromise 

    CrushFTP has released a list of indicators to help system administrators detect possible exploitation: 

    • Presence of “last_logins” entries in user.XML (not normally present) 
    • Recent modification timestamps on the default user.XML file 
    • The default user unexpectedly has admin rights 
    • Strange, long random user IDs (e.g., 7a0d26089ac528941bf8cb998d97f408m) 
    • Unknown admin-level accounts are being created 
    • Disappearance of user interface buttons, or unexpected Admin buttons on user accounts 
    • The altered version displays used by attackers to mask the true server state 

    Administrators are also being warned that threat actors are reusing scripts from previous exploits to deploy additional payloads on affected systems. 

    Remediation and Recovery 

    Organizations suspecting a breach are urged to immediately restore the default user profile from a backup created before July 16, 2025. The backup is located in: 

    swift 

    CopyEdit 

    CrushFTP/backup/users/MainUsers/default
     

    Because these zip files may not be compatible with native Windows extraction tools, users are advised to use software like 7-Zip, WinRAR, macOS Archive Utility, or WinZip. 

    If backups are unavailable, deleting the default user will trigger CrushFTP to recreate it, though any custom configurations will be lost. 

    Preventive Measures and Recommendations 

    To mitigate future risks, CrushFTP recommends the following actions: 

    • Whitelist IP addresses that can access the server 
    • Restrict administration access by IP 
    • Deploy a DMZ-based CrushFTP proxy in enterprise environments 
    • Enable automatic updates within the server preferences 
    • Sign up for emergency notifications via CrushFTP Support 

    The company emphasized the importance of proactive patching: “Anyone who had kept up to date was spared from this exploit.” 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleEuropol targets Kremlin-backed cybercrime gang NoName057(16)
    Next Article Cyberattack on CoinDCX Triggers $44M Loss, But No Impact on User Wallets

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    AI Development for Enterprises: Cost, Strategy, and Success Frameworks

    Web Development

    Exclusive Talk: Joey Conway of NVIDIA on Llama Nemotron Ultra and Open Source Models

    Machine Learning

    U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

    Development

    I’m in love with Microsoft’s limited-edition 50th anniversary wallpapers — Here’s how to get them

    News & Updates

    Highlights

    Salesforce AI Research Introduces New Benchmarks, Guardrails, and Model Architectures to Advance Trustworthy and Capable AI Agents

    May 1, 2025

    Salesforce AI Research has outlined a comprehensive roadmap for building more intelligent, reliable, and versatile…

    CVE-2025-32888 – GoTenna Mesh Hardcoded Verification Token Vulnerability

    May 1, 2025

    Not Just a Manual: How Our Project Management Framework Helps Teams Deliver

    May 19, 2025

    Linux Candy: doge – simple motd script

    April 19, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.